EP1568041A1 - Smart verify for multi-state memories - Google Patents

Smart verify for multi-state memories

Info

Publication number
EP1568041A1
EP1568041A1 EP03787219A EP03787219A EP1568041A1 EP 1568041 A1 EP1568041 A1 EP 1568041A1 EP 03787219 A EP03787219 A EP 03787219A EP 03787219 A EP03787219 A EP 03787219A EP 1568041 A1 EP1568041 A1 EP 1568041A1
Authority
EP
European Patent Office
Prior art keywords
verify
state
programming
subset
storage elements
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP03787219A
Other languages
German (de)
French (fr)
Other versions
EP1568041B1 (en
Inventor
Geoffrey S. Gongwer
Daniel C. Guterman
Yupin Kawing Fong
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SanDisk Corp
Original Assignee
SanDisk Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SanDisk Corp filed Critical SanDisk Corp
Publication of EP1568041A1 publication Critical patent/EP1568041A1/en
Application granted granted Critical
Publication of EP1568041B1 publication Critical patent/EP1568041B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C29/00Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C11/00Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
    • G11C11/56Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency
    • G11C11/5621Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency using charge storage in a floating gate
    • G11C11/5628Programming or writing circuits; Data input circuits
    • G11C11/5635Erasing circuits
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C11/00Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
    • G11C11/56Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency
    • G11C11/5621Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency using charge storage in a floating gate
    • G11C11/5628Programming or writing circuits; Data input circuits
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C16/00Erasable programmable read-only memories
    • G11C16/02Erasable programmable read-only memories electrically programmable
    • G11C16/06Auxiliary circuits, e.g. for writing into memory
    • G11C16/34Determination of programming status, e.g. threshold voltage, overprogramming or underprogramming, retention
    • G11C16/3436Arrangements for verifying correct programming or erasure
    • G11C16/3454Arrangements for verifying correct programming or for detecting overprogrammed cells
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C16/00Erasable programmable read-only memories
    • G11C16/02Erasable programmable read-only memories electrically programmable
    • G11C16/06Auxiliary circuits, e.g. for writing into memory
    • G11C16/34Determination of programming status, e.g. threshold voltage, overprogramming or underprogramming, retention
    • G11C16/3436Arrangements for verifying correct programming or erasure
    • G11C16/3454Arrangements for verifying correct programming or for detecting overprogrammed cells
    • G11C16/3459Circuits or methods to verify correct programming of nonvolatile memory cells
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C2211/00Indexing scheme relating to digital stores characterized by the use of particular electric or magnetic storage elements; Storage elements therefor
    • G11C2211/56Indexing scheme relating to G11C11/56 and sub-groups for features not covered by these groups
    • G11C2211/562Multilevel memory programming aspects
    • G11C2211/5621Multilevel programming verification

Definitions

  • This invention pertains to the field of semiconductor non- volatile data storage system architectures and their methods of operation, and, in particular, relates to program verify methods.
  • a number of architectures are used for non-volatile memories.
  • a NOR array of one design has its memory cells connected between adjacent bit (column) lines and control gates connected to word (row) lines.
  • the individual cells contain either one floating gate transistor, with or without a select transistor formed in series with it, or two floating gate transistors separated by a single select transistor. Examples of such arrays and their use in storage systems are given in the following U.S. patents and pending applications of SanDisk Corporation that are incorporated herein in their entirety by this reference: Patent Nos.
  • a NAND array of one design has a number of memory cells, such as 8, 16 or even 32, connected in series string between a bit line and a reference potential through select transistors at either end.
  • Word lines are connected to corresponding control gates of cells across multiple such different series strings. Relevant examples of such arrays and their operation are given in the following U.S. patent application Serial No. 09/893,277, filed June 27, 2001, that is also hereby incorporated by reference, and references contained therein.
  • a non-volatile memory such as flash electrically erasable and programmable read-only memories (EEPROMs)
  • the write, or programming operation is typically designed to move a targeted population of storage elements progressively through a series of data states until each element reaches its desired state. This is done by incrementally changing the state of the storage elements, sensing a parameter indicative of this state in a verify process, and further changing the state of those cells that have not yet verified as being in their desired final or target state.
  • V th threshold voltage
  • steering voltage step e.g. staircase
  • a verify operation is a sensing or read operation where the state of the storage unit is compared to its data-associated target value.
  • a binary storage unit there is only one data state aside from the ground state, while the multi-state case will have additional states.
  • each storage element or cell stores a total of 3 -bits or eight states.
  • all cells in a write or sense group being simultaneously respectively written or read are tied to a common control, or steering, gate.
  • this verify set might also proceed sequentially through the full set of steering voltage target V th levels (e.g. set of seven for eight state storage elements), associated with the corresponding set of programmable data states.
  • Figure 1 illustrates the basic multi-state program/verify operation for the 8- state case in a flash type memory.
  • Programming pulses which include incrementally increasing steering or control gate program voltage levels, are interlaced with a 7-step verify sequence of increasing steering gate sensing voltage levels.
  • Figure 2 expands this verify series in waveform 103 (also labeled B), labeling the 7 sequentially increasing verify pulses 1, 2, 3, 4, 5, 6, and 7.
  • This example shows the results of such verification for a storage element in the (charged) state (i.e. sensed threshold or V t h level) between verify levels 3 and 4, as represented by dotted line 101 (also labeled A) representing either threshold voltage directly or another parameter (e.g. a current level) indicative of this state.
  • sensing strobe As represented by waveform 105 (also labeled C).
  • waveform 107 The results of this strobed sensing verification is shown in waveform 107 (also labeled D). Whenever the verify level is lower than the stored charge level, this results in a "1" logic level pulse, as shown for the first three verify strobes, whereas when higher this results in a "0" logic level, as shown for the final four verify strobes.
  • FIG. 3 An example of this process is illustrated in Figure 3. This is a schematic representation of which states would be checked at which stage in an exemplary programming process. This can be implemented through a look-up table maintained in the controller or other mechanism.
  • the multi-states verified after a given programming pulse are indicated by a checkmark at a corresponding point on the grid. For example, after the first two programming pulses, only the lowest state above ground (e.g. the 1 state) is checked, since it is likely none of the storage elements will have advanced to the 2 state this soon. After the third pulse, a verification of the 2 state is added, since at this point there may be cells arriving at the 2 state. The 3 state is similarly added to the verification list after the fifth pulse and so on. As any cell going to the 1 state is likely to have been programmed by the seventh pulse, the 1 state verify is dropped at this point. Similarly, the 2 state is dropped at the 11th pulse and so on.
  • the operation goes as follows: Cells targeted to both states 2, 3 are first programmed and locked out to the lower V th of those two higher states (i.e. state 2). This is accomplished using only a single verify-2 operation following each programming pulses, locking out further programming of both 2s and 3s as they pass that verify-2 level. Once all 2s and 3s have so locked out, the 3 s are then automatically unlocked, and the programming sequence restarted on those 3 s, but now with the single verify operation set at the verify-3 level.
  • a variation begins with a 2s only verification during the concurrent programming of the 2 and 3 states.
  • the 3 state's verification is added after a predetermined number of programming pulses, with the 2s verify eventually dropped out to leave only the 3 s verify from then until completion.
  • Various aspects of this process are discussed more in U.S. patent number 5,920,507, which is hereby incorporated by reference.
  • This approach could be extended to greater levels of multi-state storage (e.g. storing 8 states per storage element), by locking all cells targeted for a V th equal to or greater than a target V t h level (i.e. state), using a single verify at that targeted V th level. Once all cells are so locked out, the operation is repeated for the cells targeted at the next higher Vt state or beyond, repeating this loop until those cells targeted for the highest data state pass their corresponding verify target.
  • V t h level i.e. state
  • the starting voltage should be reduced somewhat below that optimal level, increasing the number of programming pulses further still, degrading write performance.
  • This approach also re-introduces the issue of coming up with a fixed (i.e. non-intelligent/ adaptive) value (in this case for re-starting programming) which balances performance with reliable write. If pushed too aggressively in favor of increased write speed, this risks programming state overshoot, whereas if too conservative, write speed suffers.
  • multi-state memories are programmed using a "smart verify” technique with a verify-results-based dynamic adjustment of the multi-states verify range for sequential-state-based verify implementations.
  • the "smart verify” technique can increase multi-state write speed while maintaining reliable operation within sequentially verified, multi-state memory implementations. It does so by providing "intelligent" means to minimize the number of sequential verify operations for each program/verify/lockout step of the write sequence.
  • the scan's low and high ends of the threshold voltage scan window can be reliably established, with minimum time wastage from extra, unneeded verify operations.
  • the storage elements may be the memory cells of a flash EEPROM memory that are pulsed with a programming voltage and subsequently sensed to monitor their progress.
  • the next state in the sequence of multi-states is added to the verify process. This next state can either be added immediately upon the fastest cells reaching this preceding state in the sequence or, since memories are generally designed to have several programming steps to move from state to state, after a delay of several cycles.
  • the amount of delay can either be fixed or, preferably, use a parameter based implementation, allowing the amount of delay to be set according to device characteristics.
  • Figure 1 is a program/verify waveform sequence showing a full 7-verify sequence alternating with a progressively higher steering program voltage.
  • Figure 2 shows a full sequential 7-step verify sequence.
  • Figure 3 is an illustrative example of a look-up table for which states are to be verified after a given programming pulse.
  • Figure 4 is a flow chart for an exemplary embodiment of the present invention.
  • Figures 5a and 5b plot the number of verify pulses applied following each programming step in a simulation of two embodiments of the present invention.
  • Figure shows 6 the distribution of occurrences for the range of number-of- verify pulses used in the embodiment of Figure 5b.
  • Figure 7 shows the resulting simulated threshold distributions for the programming states following lockout.
  • Figure 8 shows the resulting simulated threshold distributions for the cell population not yet locked out at programming steps just prior to locking out each of the programming states.
  • Figure 9 plots the number of cells still to be programmed to their corresponding verified/locked-out conditions as a function of the number of cumulative programming pulses.
  • Figure 10 is a schematic of a program related verify / lockout implementation.
  • Figure 11 shows a reduced sequential 7 step verify sequence illustrative of smart verify operation.
  • Figure 12 is a schematic of peak verify level detection and application for establishing high voltage end of smart verify operation.
  • Figure 13 is a schematic of minimum verify level detection and application for establishing low voltage end of smart verify operation.
  • the various aspects of the present invention are applicable to non-volatile memory systems in general.
  • the description below, as well as that in the Background, is given mainly in terms of an EEPROM Flash memory embodiment
  • the particular type of storage unit used in the memory array is not a limitation to the present invention.
  • the particulars of how the storage elements are read, are written, and store data do not enter in to the main aspects of the present invention and can be those of any of the various non-volatile and volatile systems which likewise us sequential verification through state conditions to perform the cell by cell verify/program terminate operation.
  • the present invention uses verify-results- based dynamic adjustment of the multi-states verify range to establish a reliable, minimal time wasting multi-state write operation in sequential verification implementation.
  • This provides a higher speed verify algorithm while maintaining proper write reliability for sequential sensing/verification of multi-state storage. For example, when programming multi-state storage elements from state 0 sequentially through states 1, 2, and so on, at an early stage only the 1 state will be verified. When the faster programming cells begin to verify at the 1 state, state 2 will be added to the verify state range, perhaps with a lag of a number of program/verify cycles that can be parameter based. The other states can similarly be added to the verify set as programming progresses to higher state levels.
  • verify-results-based approach is to provide and use information relating to the progress of programming of the population of cells to thereby dynamically establish the appropriate and reliable span for the V th (or other parameter) scan window.
  • the first piece of useful information is knowing when the fastest programming storage element or cell of the set of cells being programmed crosses the next lowest data state's (e.g. state 1) V th target of that set (i.e. following the concept of a peak V th detector). Therefore, until such crossing is detected, only a single verify pass, for this lowest level, needs to accompany each programming pulse.
  • V tll detection is preferably defeated, which is to say that the full population of cells participates in the peak threshold voltage detection, independent of their corresponding targeted data states. In other words, this information must be known independent of the target state of that fastest cell.
  • the data conditional verify and lockout is performed for a limited range of data states above this value (e.g. up to one verify V th step above this lowest level).
  • another piece of useful information is the determination that all cells targeted for this lowest data state have in fact completed verification/lockout. Once this is known, the verify operation for that lowest state is no longer needed and can be safely eliminated.
  • This strategy could then be continued as each population of cells targeted at the existing lowest state verify complete their associated verification/lockout. This provides a way of reliably eliminating time wastage for verifying the lower end of the verify range, as well as a gauge for dynamically positioning the V th window scan.
  • the way to circumvent this problem completely is to provide information relating to the highest cell V th at any given time.
  • This is the concept introduced above; namely means to determine when the fasted programming cell of the full cell population crosses a given V th verify level, independent of its target data (the peak V t h detector). With this means applied at any time to the highest V, h range being checked (which should span one state higher than that expected to exist in the population V t h distribution), then once such crossing is signaled, the verify V th high end is incremented to the next higher level. This means is then repeated at that new level following the next pulse.
  • the upper end of that scan range is adaptively adjusted as well, based on information relating to the fastest programming cell at any time (i.e. step) in the programming sequence. More generally, the adding of higher states to the verify scan window is an independent process from removing lower state verifies as these lower states fully lockout.
  • an alternative is to not add the next state to the verify set immediately upon the fasted programming state verifying at the preceding state.
  • the actual lag amount can either be fixed, or in an exemplary embodiment use a parameter based implementation. The parameter can then be set according to operating conditions, device age, and other factors to improve performance while still allowing a sufficient safety margin. For the simulation example to be described below, this lag can gain an additional 10% or so in write speed without incurring unacceptable risk.
  • Figure 4 is a flow chart for an exemplary embodiment of the present invention and begins with step 201, where the portion of the memory to be programmed is selected. This will be one or more of the write units appropriate to the memory structure, where the write unit is referred to here as a page. Once the storage elements to be written are selected, they typically undergo a data unconditional pre- write conditioning phase 210.
  • the phase 210 is a representative erase process which may optionally include soft programming, preprogramming, erasing, soft erasing, and/or other conditioning steps (as is appropriate for the type of storage unit), to get selected storage elements ready for a data write.
  • the exemplary embodiment shown here is taken to contain steps 211, 213, 215, and 217.
  • Step 211 is a pre-programming process that is sometimes used wherein, prior to erase, the addressed storage elements are given non-data dependent programming by raising all their corresponding word-lines, for example, to level out storage element wear and provide a more uniform starting point for the erase.
  • Step 213 is the erase process, such as those described in the cited references incorporated above, appropriate for the type of storage unit being used. A particular example is the smart erase process suitable for a flash EEPROM memory is described in U.S. patent number 5,095,344.
  • Step 215 is any soft-programming or similar operations designed to put the erased storage units into a more uniform starting range for the actual write phase.
  • any of the storage units fail to verify during erase (or during soft programming if it features a verify), they can be mapped out of the logical address space at step 217 and replaced by a properly operating storage units. Again, the actual steps and their execution for phase 210 will vary according to the particular memory and its requirements.
  • the write phase 220 causes a series of incremental changes to the level of the parameter representing the data state of the storage element, the result of which is then checked, and as the storage elements do verify to their target data states, they get removed from the process. This process is largely as found in the prior art, but differs from the prior art in step 221.
  • the actual writing begins in step 223 with a programming pulse.
  • the pulse can vary in duration, voltage level, or both with each iteration of the loop 220 as is known in the art.
  • Step 225 senses the state of each of the elements pulsed in the previous pulse in relation to the verify levels, over the targeted range of levels for the states to be verified, initially encompassing only the lowest programming state. At each verify level it compares the measured parameter of each element against its associated data target value.
  • each of these elements is so compared over the range of verify states established for that iteration of the loop 220:
  • this may include all of the possible states, or it may consist of a subset based on the number of loop iterations using a look-up table or similar implementation, as described in the Background section.
  • the set of verify levels used is determined in step 221 by the verify results of the previous iteration.
  • the initial verify set of states can be taken as only the lowest state or possibly even have no verifies, and can be based on a settable parameter. (Although in the present discussion the verify set is taken as a proper subset of the full set of target values, there may arise cases where the subset is coincident with the full set, particularly when the number of multi-states is small.)
  • step 227 all elements that pass the verify condition with respect to their target state are locked out.
  • Step 229 determines whether all of the elements being programmed have verified to their target data values. If so, the process ends at step 231; if not, the process returns to step 221. More generally, some elements may fail to program, as determined in step 229, resulting in a write error, in which case the bad elements or blocks can be mapped out.
  • Step 221 determines which states to include in the next verify operation based upon the results of step 225 as well as a step 227 to the extent that the lockout condition is used for such determination. As has been described above, this is a major aspect of the present invention. Although the look-up table type of embodiment, described in the Background section with respect to Figure 3, could also determine at this stage which states to include in the next verify operation, in that case the determination would be based solely on the current iteration of the loop in the write process 220, whereas here it is based on the verify result of step 225 (and potentially step 227). Depending on the results in step 225, step 221 adds higher states to be verified, as needed.
  • step 227 it removes lower state verifications as the elements being programmed to those lower states all verify and are locked out (or were determined to be bad cells and are mapped out). Once the verify set is re-established at step 221, the process again continues to step 223.
  • Figures 5-9 show results of simulation of the "smart verify" process for the exemplary memory embodiment, wherein the storage unit is a memory cell storing 8 states.
  • the storage unit is a memory cell storing 8 states.
  • a specific example of a non-volatile memory in which this method may be implemented is described in U.S. patents 5,712,180, 6,103,573 and 6,426,893 and U.S. patent application Serial No. 09/667,344, all incorporated by reference above. Further details on an exemplary embodiment follow the discussion of the simulation.
  • the "smart-verify” algorithm was simulated to move a population of 1500 8-state cells from the ground or erased (0) state to targeted program data states (1,2,3,4,5,6,7).
  • all voltage levels are given in arbitrary units, with target threshold voltage "V th " levels for states 1,2,3,4,5,6,7 set at values 2,3,4,5,6,7,8, respectively.
  • the starting V th distribution for the entire population was set to be a normal distribution with a one- ⁇ value of 0.22 centered at - 0.25, resulting in an initial V th spanning -1 to + l ⁇ .
  • the average programming speed per programming step was set at 0.25, resulting in cells moving from one state to another in about 4 steps (and thereby allowing an entire locked out distribution for each programmed state to be confined to around that one step value).
  • a spread in speeds was incorporated, which follow a normal distribution with one- ⁇ equal to 0.015 centered at the average 0.25 speed value, resulting in speeds spanning the range 0.2 to 0.3 ⁇ V th per step.
  • the speed value assigned to any given cell remained unchanged. It should be noted that the assumption of a constant speed value for a given cell may not apply t all storage technologies, but in any case it is not required for the present invention to effective.
  • the graph of Figure 5 a plots the number of verify (vfy) pulses or steps (303) applied to the cell population following each programming step, per the smart verify algorithm. Also shown are the minimum (Vt_min, 304) and maximum (Vt max, 305) V th S of the cell population not yet locked out, as well as the low (Vfy_lo, 301) and high (Vfy_hi, 302) verify voltage levels applied following each program step.
  • the process begins with a number of pulses to bring the cells into a steady state before the threshold values begin to move up. The first few program pulses require only the lowest state verify, during which the V th distribution programs up to that verify point.
  • the number of verifies increases, plateauing at around the two to three verify pulse level, and dropping back down towards the one verify condition as the last few states are programmed to their corresponding targets (with all states verified and locked-out at around program pulse number 37).
  • the low and high verify limits of the sequential verify scans are adaptively adjusted (based on the all-lowest-state-cells verified/locked out condition and the peak V t detection criteria, respectively) to intelligently and reliably span the appropriate, optimal data state V th range, per the smart verify logic criteria.
  • the embodiment of Figure 5a includes a delay of two program steps following the fastest programming cells' verify at the existing maximum state verified, before adding the next state to the verify set.
  • the Vt_max line 305 begins to move and crosses the "Voltage' -l line of state 1 at step 6; however, only the 1 state is verified for a further two steps with the 2 state being added to the verify set at step 9, as is shown by the number of verifies (#Vfy pulses, 303) moving up to 2 at this point.
  • the entire process is complete after step 37, including the initial five program steps.
  • Figure 6 shows the distribution of occurrences for the range of number-of- verify pulses used in the embodiment of Figure 5b. While the 3-verify condition dominates, i.e. half of the time, the ability to drop to 2 verifies does occur about a quarter of the time, as does the need to increase to 4 verifies. On the average, around 2.7 verifies are needed per programming pulse, a figure that drops to under 2.5 for the embodiment of Figure 5 a. Assuming that the time required to perform one program operation (or step) is comparable to that for one verify operation, then, in the example of Figure 5b, the smart verify algorithm is capable of safely reducing the overall program time to 46% of the time that a full 7-step verify would require. Thus, raw programming speed roughly doubles.
  • FIG. 7 gives a snapshot of the resulting simulated V th distributions ("Vt") for each of the seven programming states following their lockout, as well as the starting erased or 0-state distribution, for the embodiment of Figure 5b.
  • Vt V th distributions
  • Figure 8 gives a snapshot of the resulting simulated V th distributions for the cell population not yet locked out at programming steps just prior to locking out all of the cells targeted for each of the seven programming states (as well as the starting distribution following the first programming pulse). This indicates how well- behaved the programming progress is for the population of cells through the programming sequence.
  • 601 represents the initial distribution.
  • 603 corresponds to the distribution of cells after program pulse eight, just before all targeted state 1 cells are locked out. This includes both cells with states whose ultimate destination is the 1 -state, but not yet locked out, as well as those just passing through on their way to higher states. This explains the number of cells with levels well above that for the 1 state.
  • 605 corresponds to program pulse 13, just before all state 2 cells lock out, and so on for the subsequent states.
  • Figure 9 plots the number of cells still to be programmed to their corresponding verified/locked-out conditions as a function of the number of cumulative programming pulses. Superimposed are horizontal lines indicative of the number of cells which exist in the noted range of data states.
  • Line 701 corresponds to the number of cells with data 1
  • line 702 corresponds to the number of cells with data 2, 3, 4, 5, 6 or 7, and so on until line 707 shows the number of cells with data 7.
  • the curve is flat until the cells with data 1 begin to lock out, after which it decreases fairly linearly until it flattens out as the straggling cells in the highest state finally lock out.
  • the smart verify approach is effective at improving device performance while also insuring a reliable program/verify/lockout operation. It does so by providing "intelligent" means to minimize the number of sequential verify operations for each program/verify/lockout step of the write sequence.
  • the V t h scan low and high ends of the Vu, scan window can be reliably established, with minimum time wastage from extra, unneeded verify operations.
  • the raw write performance is doubled as compared to the full seven step verify approach, with even further improvement for embodiment of Figure 5a that includes the delay before introducing the next verify state in the programming sequence to the verify set.
  • These improvements can be realized in memory systems whose programming rely upon an iterative process of progressively shifting the states of a set of storage elements operating in parallel followed by verifying the results of these shifts (or attempted shifts if an element is defective) by sensing, in parallel, a parameter indicative of each element's state.
  • An exemplary embodiment of an implementation for the smart verify technique is described with respect to Figures 10-13.
  • This illustrative embodiment describes a schematic implementation of the smart verify operation on a 3-bit/storage element technology (i.e. 8-states with 7-verify sequence).
  • the storage element or memory cell is of the type for which controlled, incrementally increasing storage levels, required for controlled multi-state writing, are achieved by incrementally increasing the steering gate voltage with each successive programming pulse.
  • multi-state memory cell reading is accomplished by sequentially scanning this steering gate through a increasing progression of 7 steering gate voltage levels (corresponding to the 7 verify voltage levels used for multi-state data programming).
  • Figure 10 schematically illustrates one embodiment of the program- verify and lockout circuit for an individual memory element 1001 (lockout terminating programming of that element for the remainder of that programming session).
  • the structure of Figure 10 is similar to that found in the prior art for use with an embodiment such as found described in the Background section with respect to Figures 1 and 2 and is discussed here for reference when the smart verify case is discussed.
  • the memory element 1001 in this example is a floating gate transistor, other forms of storage element can be used as is discussed below.
  • n such memory elements being programmed in parallel (where n can typically range from hundreds to thousands), there are a corresponding n of such program- verify circuits, all working concurrently. Information emanating from these n circuits form the base for the smart verify operation.
  • the circuit includes both components that are common to all n circuits, highlighted by the double lined borders (e.g. COUNTER 1009, RESET 1021 and the reference voltage Ref), as well as components that are replicated in each circuit (e.g. COMPARATOR 1011, DATA STATE TO BE WRITTEN register 1019, and various logic elements).
  • each memory element, 1001 is connected to a corresponding sense amp COMPARATOR 1011, which compares the conduction level of the cell to a reference source, Ref.
  • the action of this COMPARATOR 1011 is to output a "1" logic level whenever the output of SENSING PARAMETER DRIVER 1003 (e.g.
  • the steering gate voltage magnitude B, 103, of Figure 2 connected to the storage element's steering gate, is less than that element's stored memory state parameter (e.g. cell V t h as exemplified by 101 in Figure 2).
  • element's stored memory state parameter e.g. cell V t h as exemplified by 101 in Figure 2.
  • the waveforms at nodes A, B, C, and D respectively correspond to both the outputs of elements 1001, 1003, 1005, and 1007 and the waveforms labeled as 101, 103, 105, and 107, respectively, on Figure 2.
  • the COMPARATOR outputs a logic "0" level.
  • the progression of the SENSING PARAMETER DRIVER 1003 waveform is controlled by the COUNTER 1009, which counts from 1 to 7, to generate the 7 sequential verify pulses at node B, as exemplified by waveform 103 of Figure 2.
  • Each cell can store one of eight possible data states ⁇ 0,1,2,3,4,5,6,7 ⁇ , the specific one of which, for each cell, is loaded into a corresponding DATA STATE TO BE WRITTEN register 1019.
  • State 0 is established by a data unconditional preset operation (e.g. sector erase) to all the to-be- written cells, corresponding to phase 210 in Figure 4.
  • Data states 1, 2, 3, 4, 5, 6 and 7 constitute the seven programmable states, and correspond to the COUNTER 1009 related verify levels of 1, 2, 3, 4, 5, 6 and 7, respectively, which are used during program verify to establish those states.
  • the storage element parameter e.g. storage cell V th
  • the storage element parameter is sequentially and controllably moved through states 1, 2, 3, ... until terminated by the verify/lockout operation.
  • the function of the three XNOR gates 1015a-c (corresponding to the 3-bit equivalent of the eight data states) feeding into the 4-input NAND gate 1017, all interposed between the COUNTER 1009 and the DATA STATE TO BE WRITTEN register 1019, is to trap the condition when a match occurs between the target DATA STATE TO BE WRITTEN and the instantaneous level being verified (via the SENSING PARAMETER DRIVER 1003), as governed by the COUNTER 1009 value.
  • the fourth leg of the NAND comes from the COMPARATOR 1011 output, gated by a positive pulsing VERIFY STROBE circuit, 1005, which provides a time synchronized pulse of the comparator output D from the AND gate 1007, as exemplified by 107 in Figure 2.
  • a positive pulsing VERIFY STROBE circuit 1005
  • COMPARATOR output high (e.g. cell V th higher than verify level)
  • the output of this 4-input NAND gate 1017 pulses down to a logical "0" (gated by the VERIFY STROBE 1005 pulse), remaining at logical "1" otherwise.
  • the output of the 4-input NAND gate 1017 is fed into one leg (termed the set leg) of the LOCKOUT SR latch 1013 (implemented here in a cross-coupled NAND gate based latch).
  • all LOCKOUT SR latches 1013 are set to a logical "0". This is accomplished by applying a RESET pulse 1021 (pulsing down to logic level "0" in this implementation, remaining at logic level” 1" otherwise) to the other leg (termed the reset leg) of all these SR latches, initializing all corresponding storage elements' LOCKOUTS to a logical "0".
  • the following describes the progression of program/verify leading to lockout for a memory cell whose data state targeted is state 3, as is shown in Figure 2.
  • the cell is set to data state 0 (e.g. erased), and its corresponding LOCKOUT latch 1013 is set to logic level "0" by the RESET signal 1021.
  • an initial programming level e.g. steering or control gate voltage
  • it receives a series of progressively increasing level programming pulses, each pulse being followed by the 7-level verify pulse sequence, as illustrated in Figure 1.
  • the strobed results of this verify sequence is all 0's (i.e. no positive going pulses).
  • the strobed result is a single logical "1" pulse during the level 1 verify strobe. This does not trigger the lockout condition, however, because during this time, the verify condition (i.e. COUNTER 1009 value equaling 1), does not match the targeted data state (i.e. DATA STATE TO BE WRITTEN 1019 equaling 3).
  • the verify condition i.e. COUNTER 1009 value equaling 1
  • the targeted data state i.e. DATA STATE TO BE WRITTEN 1019 equaling 3.
  • the condition of verify state i.e. COUNTER 1009 value
  • target data state i.e. COUNTER 1009 value
  • Waveforms 1101, 1103, 1105, and 1107 correspond to signals 101, 103, 105, and 107 of Figure 2, and again respectively represent the signals to the cell parameter of storage element 1001 (node A), the output of sensing parameter driver 1003 (node B), the output of the verify strobe 1005 (node C), and the output of AND gate 1007 (node D of Figure 10).
  • Figure 12 schematically illustrates one preferred embodiment for implementing the maximum or peak verify level when programming n memory elements in parallel. It includes an n-input OR gate 1211, with inputs 1207 coming from the corresponding D nodes of each of the n verify/lockout circuits, as represented in Figure 10 as the output of AND gate 1007. As described above, each D node will momentarily pulse to logic level "1" (strobed by the VERIFY STROBE, 1005 Figure 10), whenever the storage element state (e.g. cell V ⁇ parameter) exceeds the applied verify level (i.e. SENSING PARAMETER, the value at node B of Figure 10 and represented as 1103 on Figure 11).
  • SENSING PARAMETER the value at node B of Figure 10 and represented as 1103 on Figure 11.
  • the n-input OR gate 1211 will likewise pulse to logic level "1" whenever one or more of the addressed memory elements satisfies this programming level (e.g. cell V th ) requirement.
  • This pulsing condition is established when the instantaneous verify level, as governed by COUNTER 1249, matches the existing value of MAX VERIFY LEVEL “COUNT” REGISTER 1233, as established by an exclusive OR circuit function implemented in the three XNORs 1251a-c, thereby allowing the pulse to pass through AND gate 1253.
  • This pulse is then fed into the NEW MAX VERIFY LEVEL "COUNT” functional block 1235 to assert the peak verify level to its next available value.
  • the n-input OR gate 1211 will maintain a logical "0", thereby freezing this current maximum verify level.
  • the n-input OR gate 1211 will once again output a logical "1" pulse, thereby incrementing the maximum verify level to the next higher level.
  • FIG. 12 An alternative implementation to the instantaneous incrementing approach is illustrated in Figure 12 in the alternative branch, emanating directly below the NEW MAX VERIFY LEVEL “COUNT” circuit block 1235, and consisting of elements 1241, 1243, 1245, and 1247.
  • a program pulse counter termed PROGRAM COUNT
  • PROGRAM COUNT is set to 0 via functional block 1241, and gets incremented by 1 with each successive programming pulse via functional blocks 1243 and 1245. Once this count reaches a prescribed "delay count" (e.g.
  • the "delay count” value is preferably implemented through a settable parameter, as discussed previously, rather than having a fixed value.
  • the "delay count” value could be monitored by a controller and dynamically changed based upon device behavior, for example in response to programming or read errors, or operating conditions, such as temperature or power supply variations.
  • the peak verify level is set to that associated with the first state (i.e. MAX VERIFY LEVEL "COUNT" REGISTER 1233 is set to 1). This is allowed because the state set for all the addressed storage elements prior to this program operation is state 0 (e.g. via an erase operation), and it will take a number of programming pulses before any of these cells reach the verify level associated with this first state.
  • Figure 13 schematically illustrates one preferred embodiment for implementing the minimum verify level when programming n storage elements in parallel. It depicts n circuit blocks (1301-1 to 1301-n) that operate in parallel; one block for each of the n concurrently addressed storage elements. Each said circuit block includes existing circuit portions of the corresponding n verify/lockout circuits described in Figure 10. As with Figure 10, those circuit blocks which are common to all n circuits are highlighted by the double lined borders (.e.g. the MIN VERIFY LEVEL "COUNT" REGISTER 1305).
  • Each said circuit block 1301-/ (1 ⁇ i ⁇ n) contains a matching circuit (matching DATA STATE TO BE WRITTEN 1019 with ML VERIFY LEVEL), which consists of an exclusive-or circuit function, built from three XNOR 1331a-c gates feeding into a 3-input NAND gate 1333 for the exemplary 3-bit implementation.
  • a matching circuit matching DATA STATE TO BE WRITTEN 1019 with ML VERIFY LEVEL
  • this matching circuit to ignore the status of all storage elements whose target data do not match that associated with the current minimum verify level. In does this by outputting a logical level "1" to the lower input leg of the 2-input OR gate 1339. This is then transmitted to the n +1 input AND gate 1313, and thereby does not interfere with the decision process.
  • the output of this the n+1 input AND gate 1313 is fed into a series of two functional circuit blocks.
  • the first circuit block 1315 termed NEW MIN VERIFY LEVEL "COUNT"
  • NEW MIN VERIFY LEVEL "COUNT” will, upon receiving a logical "1" pulse, increment the existing minimum verify level by one.
  • the following block 1317 then loads this new minimum value into the MIN VERIFY LEVEL "COUNT" REGISTER 1305, for use in subsequent program/verify series. Note that if at any time there are no storage elements targeted to the data state associated with the current minimum verify level, the embodiment of Figure 13 will likewise increment this minimum verify level to that of the next higher data state for the following program/verify operations.
  • the minimum verify level attempts to exceed the top of the verify range (i.e. MAXIMUM ALLOWED), then no further such increase is allowed.
  • the minimum verify level then remains pinned to the top of the verify range (i.e. verify level 7 in this embodiment).
  • the minimum verify level is set to that associated with the first state (i.e. MIN VERIFY LEVEL "COUNT" REGISTER 1305 is set to 1), in preparation for cells to be programmed up to this verify level.
  • the number of verify pulses following each programming pulse is dynamically kept to the minimum required at any point in the programming sequence.
  • MAX and MIN verify levels will be both at state 1.
  • MAX will increase to stay above the fastest programming cells, independently, at some later point MIN will also increase, as all cells targeted for the prior minimum state have so programmed (and locked out).
  • this continual dynamic readjustment of max and min allows the average number of verifies required to be less than half that value (e.g. ⁇ 3 verifies per program step on the average).
  • the maximum verify level gets pinned to the high end limit, 7, and at some later point the minimum verify level also gets pinned to this limit. Examples of such operating behavior are shown in Figures 5a and 5b of the disclosure.
  • multi-state embodiments using a charge storing device, such as floating gate EEPROM or FLASH cells, for the memory device
  • a charge storing device such as floating gate EEPROM or FLASH cells
  • other multi-state embodiments including magnetic and optical media, as well as volatile storage media such as multi-state DRAM.
  • the various aspects of the present invention may be applied to other memory types, including, but not limited to, sub O.lum transistors, single electron transistors, organic/carbon based nano-transistors, and molecular transistors.
  • NROM and MNOS cells such as those respectively described in U.S.

Abstract

The present invention presents a "smart verify" technique whereby multi-state memories are programmed using a verify-results-based dynamic adjustment of the multi-states verify range for sequential-state-based verify implementations. This technique can increase multi-state write speed while maintaining reliable operation within sequentially verified, multi-state memory implementations. It does so by providing "intelligent" means to minimize the number of sequential verify operations for each program/verify/lockout step of the write sequence. In an exemplary embodiment of the write sequence for the multi-state memory during a program/verify cycle sequence of the selected storage elements, at the beginning of the process only the lowest state of the multi-state range to which the selected storage elements are being programmed is checked during the verify phase. Once the first storage state is reached by one or more of the selected elements, the next state in the sequence of multi-states is added to the verify process. This next state can either be added immediately upon the fastest elements reaching this preceding state in the sequence or after a delay of several program cycles. The adding of states to the set being checked in the verify phase continues through the rest of the set of multi-states in sequence, until the highest state has been added. Additionally, lower states can be removed from the verify set as all of the selected storage elements bound for these levels verify successfully to those target values and are locked out from further programming.

Description

SMART VERIFY FOR MULTI-STATE MEMORIES
BACKGROUND OF THE INVENTION
[0001] This invention pertains to the field of semiconductor non- volatile data storage system architectures and their methods of operation, and, in particular, relates to program verify methods.
[0002] A number of architectures are used for non-volatile memories. A NOR array of one design has its memory cells connected between adjacent bit (column) lines and control gates connected to word (row) lines. The individual cells contain either one floating gate transistor, with or without a select transistor formed in series with it, or two floating gate transistors separated by a single select transistor. Examples of such arrays and their use in storage systems are given in the following U.S. patents and pending applications of SanDisk Corporation that are incorporated herein in their entirety by this reference: Patent Nos. 5,095,344, 5,172,338, 5,602,987, 5,663,901, 5,430,859, 5,657,332, 5,712,180, 5,890,192, 6,103,573, 6,151,248, and 6,426,893 and Serial o. 09/667,344, filed September 22, 2000.
[0003] A NAND array of one design has a number of memory cells, such as 8, 16 or even 32, connected in series string between a bit line and a reference potential through select transistors at either end. Word lines are connected to corresponding control gates of cells across multiple such different series strings. Relevant examples of such arrays and their operation are given in the following U.S. patent application Serial No. 09/893,277, filed June 27, 2001, that is also hereby incorporated by reference, and references contained therein.
[0004] When writing multi-state per storage element data into a non-volatile memory, such as flash electrically erasable and programmable read-only memories (EEPROMs), the write, or programming operation, is typically designed to move a targeted population of storage elements progressively through a series of data states until each element reaches its desired state. This is done by incrementally changing the state of the storage elements, sensing a parameter indicative of this state in a verify process, and further changing the state of those cells that have not yet verified as being in their desired final or target state. In a EEPROM, this typically consists of increasing threshold voltage (Vth) levels (starting from the erased or 0 state), using a sequentially increasing steering voltage step (e.g. staircase) implementation for each subsequent programming pulse. As each storage element passes through its to-be- written Vth data state target, it becomes locked out during the corresponding state verify operation, terminating all subsequent writing to the associated storage elements for the duration of that write session.
[0005] A verify operation is a sensing or read operation where the state of the storage unit is compared to its data-associated target value. For a binary storage unit there is only one data state aside from the ground state, while the multi-state case will have additional states. For example, consider the case where each storage element or cell stores a total of 3 -bits or eight states. In a common cell array architecture, all cells in a write or sense group being simultaneously respectively written or read are tied to a common control, or steering, gate. In such an implementation, in order to read or verify cells over the range of possible states (e.g. states {0,1,2,3,4,5,6,7} for the 3-bit example) it is necessary to serially (e.g. sequentially) scan through all the steering voltage sensing conditions. In the example, there are seven such sequential sensing operations for the read operation. These are performed at the seven threshold voltage discrimination levels to simultaneously determine the stored state of the eight possible states for each cell within the full set of cells being read or verified. Using this sort of read operation as applied to the program/verify/lockout sequence, wherein each programming pulse is accompanied with a series of verify steps (along with the associated state conditional programming lockout), this verify set might also proceed sequentially through the full set of steering voltage target Vth levels (e.g. set of seven for eight state storage elements), associated with the corresponding set of programmable data states.
[0006] Figure 1 illustrates the basic multi-state program/verify operation for the 8- state case in a flash type memory. Programming pulses, which include incrementally increasing steering or control gate program voltage levels, are interlaced with a 7-step verify sequence of increasing steering gate sensing voltage levels. [0007] Figure 2 expands this verify series in waveform 103 (also labeled B), labeling the 7 sequentially increasing verify pulses 1, 2, 3, 4, 5, 6, and 7. This example shows the results of such verification for a storage element in the (charged) state (i.e. sensed threshold or Vth level) between verify levels 3 and 4, as represented by dotted line 101 (also labeled A) representing either threshold voltage directly or another parameter (e.g. a current level) indicative of this state. The results of sensing at each of the verify levels in waveform for the sensing parameter (such as steering gate voltage) is captured by a sensing strobe, as represented by waveform 105 (also labeled C). The results of this strobed sensing verification is shown in waveform 107 (also labeled D). Whenever the verify level is lower than the stored charge level, this results in a "1" logic level pulse, as shown for the first three verify strobes, whereas when higher this results in a "0" logic level, as shown for the final four verify strobes.
[0008] In practice, using this full verify set for each step in the programming is overkill and wastes time (wherein typically each verify sensing operation takes about the same time as a programming pulse), since at any point in the programming progression there will be only a limited Vth range (or range of data states) over which the population of cells can span. Present designs exploit this characteristic by providing a limited, sliding range verify set implementation, as described in the following.
[0009] Using the progressive programming approach, there is a statistically well- behaved distribution of threshold voltages within a population of cells as they progress through the ascending states, starting with state 1 , then to state 2 and so on up to state 7. To help explain the limited verify set concept, it helps to first disregard the data state conditional lockout; i.e. assume no lockout. Given this, an example of one Vth distribution scenario for this progression is described in the following snapshot. Starting from the erased state, the population of cells has been successively programmed to a point where a significant fraction of that population lies within the Vth range between states 4 and 5. In this scenario there are relatively few straggler that lie between states 3 and 4, and none with VthS below state 3. Likewise, there are relatively few cells racing ahead, with Vth s between states 5 and 6 (i.e. reading as state 5) and none at states 6 and above. In such a scenario, it is pointless to perform the verify operations searching for states 1, 2, 6 or 7, since at this point the cells only exist in the Vt range spanning states 3, 4 or 5. Consequently the approach now in use reduces the range of Vt verify levels to span only that window range required to envelop the expected Vth range at that given point in the programming sequence, (e.g. in the above example, at this point in the programming sequence only three verifies are performed, spanning states 3, 4 and 5, in place of the full set of seven verifies.) As programming proceeds to higher threshold voltage ranges, the Vth verify window range is slid upwards, accordingly. In this way, the programming operation is speeded up substantially. For example in the case for which the time for each programming pulse is comparable to that for each verify step, this approach reduces the total write time in half, from the maximum 8 steps (i.e. 1 programming pulse plus 7 verifies) to 4 steps (1 programming pulse plus 3 verifies), doubling the raw write speed.
[0010] An example of this process is illustrated in Figure 3. This is a schematic representation of which states would be checked at which stage in an exemplary programming process. This can be implemented through a look-up table maintained in the controller or other mechanism. In the table of Figure 3, the multi-states verified after a given programming pulse are indicated by a checkmark at a corresponding point on the grid. For example, after the first two programming pulses, only the lowest state above ground (e.g. the 1 state) is checked, since it is likely none of the storage elements will have advanced to the 2 state this soon. After the third pulse, a verification of the 2 state is added, since at this point there may be cells arriving at the 2 state. The 3 state is similarly added to the verification list after the fifth pulse and so on. As any cell going to the 1 state is likely to have been programmed by the seventh pulse, the 1 state verify is dropped at this point. Similarly, the 2 state is dropped at the 11th pulse and so on.
[0011] Although this reduces the number of reads between programming pulses significantly compared to checking all the non-ground states (for example, 7 reads in the 3 -bit example), there are a number of problems with using such a dead reckoning reduced scan, sliding window approach for higher write speed, while maintaining sufficient guard-band to the scan window to insure reliable write operation. These problems mainly relate to the determination of sufficient guard-band. Namely, how soon should each new state be brought in and when is it safe to drop out each state? The verify operation, as exemplified in Figure 3, must safely cover the operation of the memory regardless of its operating conditions, such as temperature or voltage source, device age, or manufacturing differences associated with processing and other variations. Although performance is increased by checking less states during the verify operation, there must be enough checking to insure robust operation. Furthermore, although the performance improvement benefit does increase with the increasing number of states per storage element by using the above reduced scan, so does room for error, particularly considering the trend to lower operating voltages.
[0012] Returning to the cell-by-cell data state conditional lockout, essential to terminating further programming on each cell once its target data (Vth) state is achieved, this now must take place within the reduced window Vth scan. Since the remaining VthS are not checked, no lockout of their associated states is possible during that particular programming step. (e.g. In the above example, only cells with data states 3, 4 and 5 have the possibility of being locked out, whereas cells with data states 1, 2, 6, 7 cannot be so locked out during that specific programming/verify step). Therefore a critical requirement for this verify speed-up algorithm is that, at any time in the programming sequence, a sufficiently wide and properly positioned verify window range is established to cover the spread of the expected Vth distribution (excluding those cells already locked out).
[0013] In the case of inadequate verify span window, cells at both ends of the Vth distribution (i.e. both those which program too slowly or too quickly) may be missed when they in fact do achieve their proper Vt levels and require the programming lockout. This will inevitably lead to corresponding data state error (i.e. write failure), as those cells proceed to higher still Vth levels (never having been locked out in the case of the laggards, or having locked out too late, the likely fate for the speeders.) Consequently, the reduced Vth scan window algorithm (i.e. its window size and program step dependent placement) must be carefully tailored to achieve increased write speed without degrading write reliability.
[0014] An alternate existing approach for reducing the number of verify operations per programming pulse has been developed for a 2-bit per cell NAND architecture (whose four states, for referencing purposes, are designated here as 0, 1, 2, 3, in ascending Vt level), as described above in relation to U.S. patent application Serial No. 09/893,277, filed June 27, 2001, that was incorporated by reference above. One optional operating mode for this NAND implementation logic treats each storage unit as having multiple sector addresses, each address storing one of the two bits of the storage unit, rather than a single storage unit storing multiple bits within one sector address. In the case in which the higher two Vth states (2, 3) are to be programmed up from the lower two Vth states (0, 1) the operation goes as follows: Cells targeted to both states 2, 3 are first programmed and locked out to the lower Vth of those two higher states (i.e. state 2). This is accomplished using only a single verify-2 operation following each programming pulses, locking out further programming of both 2s and 3s as they pass that verify-2 level. Once all 2s and 3s have so locked out, the 3 s are then automatically unlocked, and the programming sequence restarted on those 3 s, but now with the single verify operation set at the verify-3 level. A variation begins with a 2s only verification during the concurrent programming of the 2 and 3 states. The 3 state's verification is added after a predetermined number of programming pulses, with the 2s verify eventually dropped out to leave only the 3 s verify from then until completion. Various aspects of this process are discussed more in U.S. patent number 5,920,507, which is hereby incorporated by reference.
[0015] This approach could be extended to greater levels of multi-state storage (e.g. storing 8 states per storage element), by locking all cells targeted for a Vth equal to or greater than a target Vth level (i.e. state), using a single verify at that targeted Vth level. Once all cells are so locked out, the operation is repeated for the cells targeted at the next higher Vt state or beyond, repeating this loop until those cells targeted for the highest data state pass their corresponding verify target.
[0016] Using this approach, only a single verify pulse is required with each programming pulse operation, a definite plus in systems whose verify times dominate those of programming, thereby offering an optimal write performance solution. However for systems whose single pulse programming times are comparable to those of single verifies, typical of existing mass storage FLASH memories, the above approach actually reduces write performance, for two reasons: (1) The programming progress of cells targeted for states above that being verified are stopped prematurely and unnecessarily, dictating additional programming time in subsequent Vt programming phases to make up for the progress lost by this early termination; (2) The initial programming conditions (e.g. steering, or control, gate voltage staircase starting level) upon resumption at the next higher state must be dropped back to a lower value from that left off at the end of the previous programming sequence. This drop-back is essential in order to insure that cells do not overshoot their target range, since the specific, appropriate level that the each cell of the population had previously locked out at (and from which corresponding level each cell should resume programming) can no longer be applied to the cells, as a population, in a single program starting condition. At best the starting condition needs to be reduced to that associated with the fastest programming cell (i.e. the programming voltage set for the first cell in the group to have locked out at), thereby increasing the required number of programming pulses for the remaining cells. For safety margin, the starting voltage should be reduced somewhat below that optimal level, increasing the number of programming pulses further still, degrading write performance. This approach also re-introduces the issue of coming up with a fixed (i.e. non-intelligent/ adaptive) value (in this case for re-starting programming) which balances performance with reliable write. If pushed too aggressively in favor of increased write speed, this risks programming state overshoot, whereas if too conservative, write speed suffers.
[0017] In view of the limitations of existing program/verify approaches, the following section discusses an improved approach which can adaptively/dynamically satisfy this combined requirement of fast write performance while insuring write reliability.
SUMMARY OF THE INVENTION
[0018] According to one principal aspect of the present invention, briefly and generally, multi-state memories are programmed using a "smart verify" technique with a verify-results-based dynamic adjustment of the multi-states verify range for sequential-state-based verify implementations. The "smart verify" technique can increase multi-state write speed while maintaining reliable operation within sequentially verified, multi-state memory implementations. It does so by providing "intelligent" means to minimize the number of sequential verify operations for each program/verify/lockout step of the write sequence. In an exemplary embodiment, by monitoring population movement to detect both the fastest programming cell, via data unconditional verification at the highest data state level covered in the verify scan range, as well as the all-cell-lockout condition for the lowest data state covered in that scan range (thereby encompassing the slowest programming cells), the scan's low and high ends of the threshold voltage scan window can be reliably established, with minimum time wastage from extra, unneeded verify operations.
[0019] In an exemplary embodiment of the write sequence for the multi-state memory during a program/verify sequence of the selected storage elements, at the beginning of the process only the lowest state of the multi-state range to which the selected storage elements are being programmed is checked during the verify phase. For example, the storage elements may be the memory cells of a flash EEPROM memory that are pulsed with a programming voltage and subsequently sensed to monitor their progress. Once the first storage state is reached by one or more of the selected elements, the next state in the sequence of multi-states is added to the verify process. This next state can either be added immediately upon the fastest cells reaching this preceding state in the sequence or, since memories are generally designed to have several programming steps to move from state to state, after a delay of several cycles. The amount of delay can either be fixed or, preferably, use a parameter based implementation, allowing the amount of delay to be set according to device characteristics.
[0020] The adding of states to the set being checked in the verify phase continues as per above through the rest of the multi-states in sequence until the highest state has been added. Similarly, lower states can be removed from the verify set as all of the selected storage elements bound for these levels verify successfully to those target values and are locked out from further programming. Additionally, previously identified defective cells that are unable to program properly can also be mapped out (e.g. by locking them out initially) eliminating their impact on the program/intelligent verify operation. [0021] Additional aspects, features and advantages of the present invention are included in the following description of exemplary embodiments, which description should be read in conjunction with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
[0022] Figure 1 is a program/verify waveform sequence showing a full 7-verify sequence alternating with a progressively higher steering program voltage.
[0023] Figure 2 shows a full sequential 7-step verify sequence.
[0024] Figure 3 is an illustrative example of a look-up table for which states are to be verified after a given programming pulse.
[0025] Figure 4 is a flow chart for an exemplary embodiment of the present invention.
[0026] Figures 5a and 5b plot the number of verify pulses applied following each programming step in a simulation of two embodiments of the present invention.
[0027] Figure shows 6 the distribution of occurrences for the range of number-of- verify pulses used in the embodiment of Figure 5b.
[0028] Figure 7 shows the resulting simulated threshold distributions for the programming states following lockout.
[0029] Figure 8 shows the resulting simulated threshold distributions for the cell population not yet locked out at programming steps just prior to locking out each of the programming states.
[0030] Figure 9 plots the number of cells still to be programmed to their corresponding verified/locked-out conditions as a function of the number of cumulative programming pulses.
[0031] Figure 10 is a schematic of a program related verify / lockout implementation. [0032] Figure 11 shows a reduced sequential 7 step verify sequence illustrative of smart verify operation.
[0033] Figure 12 is a schematic of peak verify level detection and application for establishing high voltage end of smart verify operation.
[0034] Figure 13 is a schematic of minimum verify level detection and application for establishing low voltage end of smart verify operation.
DESCRIPTION OF EXEMPLARY EMBODIMENTS OF THE INVENTION
[0035] The various aspects of the present invention are applicable to non-volatile memory systems in general. Although the description below, as well as that in the Background, is given mainly in terms of an EEPROM Flash memory embodiment, the particular type of storage unit used in the memory array is not a limitation to the present invention. The particulars of how the storage elements are read, are written, and store data do not enter in to the main aspects of the present invention and can be those of any of the various non-volatile and volatile systems which likewise us sequential verification through state conditions to perform the cell by cell verify/program terminate operation.
[0036] According to a principal aspect, the present invention uses verify-results- based dynamic adjustment of the multi-states verify range to establish a reliable, minimal time wasting multi-state write operation in sequential verification implementation. This provides a higher speed verify algorithm while maintaining proper write reliability for sequential sensing/verification of multi-state storage. For example, when programming multi-state storage elements from state 0 sequentially through states 1, 2, and so on, at an early stage only the 1 state will be verified. When the faster programming cells begin to verify at the 1 state, state 2 will be added to the verify state range, perhaps with a lag of a number of program/verify cycles that can be parameter based. The other states can similarly be added to the verify set as programming progresses to higher state levels. Lower lying verify levels can be removed when the full set of storage elements targeted to be set at these lower levels do so verify. Consequently this verify results based dynamic adjustment improves upon the dead reckoning reduced scan, guard-banded sliding window approach described in the Background section by allowing a minimal number of verifies while insuring adequate verify range coverage. Generally speaking, the greater the number of states, the greater the improvement realized by the present invention.
[0037] The various aspects of present invention can be implemented in various non-volatile memories such as those incorporated by reference in the Background. More details of sensing processes are presented in U.S. patent applications serial number 09/671,793, filed September 27, 2000, serial number 10/052,888, filed January 18, 2002, and serial number 10/052,924, filed January 18, 2002, which are hereby incorporated by reference. Although the exemplary embodiment is described in terms of verifying voltage values, as the threshold voltage is the relevant physical quantity of a floating gate type memory cell, the verification can be based on the use of other parameters indicative of the state of the storage element, such as current or a frequency. A number of these variations are described in these references. Furthermore, the various aspects of the present invention can be combined with the use of read and verify margins as described further in use of U.S. patent number 5,532,962, which is also hereby incorporated by reference.
[0038] The basic idea of verify-results-based approach is to provide and use information relating to the progress of programming of the population of cells to thereby dynamically establish the appropriate and reliable span for the Vth (or other parameter) scan window. Starting from the erased or ground state (state 0), the first piece of useful information is knowing when the fastest programming storage element or cell of the set of cells being programmed crosses the next lowest data state's (e.g. state 1) Vth target of that set (i.e. following the concept of a peak Vth detector). Therefore, until such crossing is detected, only a single verify pass, for this lowest level, needs to accompany each programming pulse. Up to this point, the data conditional aspect of Vtll detection is preferably defeated, which is to say that the full population of cells participates in the peak threshold voltage detection, independent of their corresponding targeted data states. In other words, this information must be known independent of the target state of that fastest cell. Once so detected, then the data conditional verify and lockout is performed for a limited range of data states above this value (e.g. up to one verify Vth step above this lowest level). [0039] Continuing with the process, another piece of useful information is the determination that all cells targeted for this lowest data state have in fact completed verification/lockout. Once this is known, the verify operation for that lowest state is no longer needed and can be safely eliminated. This signals a shifting up of the bottom of the Vth scan window to the next higher Vth data state; for example, if states 1, 2, 3 were being verified, this would then shift to states 2, 3. This strategy could then be continued as each population of cells targeted at the existing lowest state verify complete their associated verification/lockout. This provides a way of reliably eliminating time wastage for verifying the lower end of the verify range, as well as a gauge for dynamically positioning the Vth window scan.
[0040] A possible approach could use this lower state removal condition exclusively in making the determination of when to increment the higher state verify. In such an approach, however, there is still the risk of excessively fast programming cells racing beyond the above determined high end range of the Vth scan, thereby missing the opportunity to provide lockout. To reduce this risk, one option is to add a guard-band to the high range of the V ll scan, thereby reducing the likelihood of such occurrence. The price of such an approach, however, is reduced write performance because of frequent unnecessary verifications at the high Vth end.
[0041] The way to circumvent this problem completely is to provide information relating to the highest cell Vth at any given time. This is the concept introduced above; namely means to determine when the fasted programming cell of the full cell population crosses a given Vth verify level, independent of its target data (the peak Vth detector). With this means applied at any time to the highest V,h range being checked (which should span one state higher than that expected to exist in the population Vth distribution), then once such crossing is signaled, the verify Vth high end is incremented to the next higher level. This means is then repeated at that new level following the next pulse. (Note, as before, if the targeted data for this fastest cell or cells does in fact match the aforementioned highest verify level, they will then be locked out as well.) In this way, as with the lower end of the Vth scan range, the upper end of that scan range is adaptively adjusted as well, based on information relating to the fastest programming cell at any time (i.e. step) in the programming sequence. More generally, the adding of higher states to the verify scan window is an independent process from removing lower state verifies as these lower states fully lockout.
[0042] At first glance this peak Vth detector approach appears to reduce write speed by forcing one additional verify at the high end, which by intent is targeted to not find its associated Vt the majority of the time; however, in the long run it pays for itself, since the alternative of blind guard-banding to insure reliable write operation for the existing sliding window approach will very likely dictate wider still window enveloping.
[0043] In order to improve operation further still, an alternative is to not add the next state to the verify set immediately upon the fasted programming state verifying at the preceding state. There is no need to rush to include the next higher verify level since, by design (e.g. as governed by the steering gate's program voltage staircase), it will commonly take a number of program pulses for even the fastest programming cells to reach this next higher state level. For example, if by design it takes four programming pulses to proceed from one storage state to another, one could safely wait for one or two program pulses beyond the peak detection point, before adding then next verify level. The actual lag amount can either be fixed, or in an exemplary embodiment use a parameter based implementation. The parameter can then be set according to operating conditions, device age, and other factors to improve performance while still allowing a sufficient safety margin. For the simulation example to be described below, this lag can gain an additional 10% or so in write speed without incurring unacceptable risk.
[0044] The entire sequence for this approach goes on to completion as in existing implementations, ending at the earlier of : [1] all cells having locked out, or [2] at the end of the (staircase) programming sequence, in which case a flag is raised signaling this condition. A simulation based capability of this approach for a particular embodiment is detailed below, which doubles the raw write speed without incurring risks of the above-mentioned prior art (i.e. "non-intelligent") verify pulse reduction schemes.
[0045] Figure 4 is a flow chart for an exemplary embodiment of the present invention and begins with step 201, where the portion of the memory to be programmed is selected. This will be one or more of the write units appropriate to the memory structure, where the write unit is referred to here as a page. Once the storage elements to be written are selected, they typically undergo a data unconditional pre- write conditioning phase 210.
[0046] The phase 210 is a representative erase process which may optionally include soft programming, preprogramming, erasing, soft erasing, and/or other conditioning steps (as is appropriate for the type of storage unit), to get selected storage elements ready for a data write. The exemplary embodiment shown here is taken to contain steps 211, 213, 215, and 217.
[0047] Step 211 is a pre-programming process that is sometimes used wherein, prior to erase, the addressed storage elements are given non-data dependent programming by raising all their corresponding word-lines, for example, to level out storage element wear and provide a more uniform starting point for the erase. Step 213 is the erase process, such as those described in the cited references incorporated above, appropriate for the type of storage unit being used. A particular example is the smart erase process suitable for a flash EEPROM memory is described in U.S. patent number 5,095,344. Step 215 is any soft-programming or similar operations designed to put the erased storage units into a more uniform starting range for the actual write phase. If any of the storage units fail to verify during erase (or during soft programming if it features a verify), they can be mapped out of the logical address space at step 217 and replaced by a properly operating storage units. Again, the actual steps and their execution for phase 210 will vary according to the particular memory and its requirements.
[0048] At this point, the memory is ready for the write phase. The write phase 220 causes a series of incremental changes to the level of the parameter representing the data state of the storage element, the result of which is then checked, and as the storage elements do verify to their target data states, they get removed from the process. This process is largely as found in the prior art, but differs from the prior art in step 221.
[0049] Following the setting of the initial verify range of step 221, for the exemplary embodiment of a charge storing memory element (e.g. EEPROM or flash), the actual writing begins in step 223 with a programming pulse. The pulse can vary in duration, voltage level, or both with each iteration of the loop 220 as is known in the art. There may also be several initial pulses before the first verify, where the particular number can be a parameter based implementation. Step 225 senses the state of each of the elements pulsed in the previous pulse in relation to the verify levels, over the targeted range of levels for the states to be verified, initially encompassing only the lowest programming state. At each verify level it compares the measured parameter of each element against its associated data target value. In this way, each of these elements is so compared over the range of verify states established for that iteration of the loop 220: In the prior art this may include all of the possible states, or it may consist of a subset based on the number of loop iterations using a look-up table or similar implementation, as described in the Background section. According to a principle aspect of the present invention, the set of verify levels used is determined in step 221 by the verify results of the previous iteration. The initial verify set of states can be taken as only the lowest state or possibly even have no verifies, and can be based on a settable parameter. (Although in the present discussion the verify set is taken as a proper subset of the full set of target values, there may arise cases where the subset is coincident with the full set, particularly when the number of multi-states is small.)
[0050] In step 227, all elements that pass the verify condition with respect to their target state are locked out. Step 229 determines whether all of the elements being programmed have verified to their target data values. If so, the process ends at step 231; if not, the process returns to step 221. More generally, some elements may fail to program, as determined in step 229, resulting in a write error, in which case the bad elements or blocks can be mapped out.
[0051] Step 221 determines which states to include in the next verify operation based upon the results of step 225 as well as a step 227 to the extent that the lockout condition is used for such determination. As has been described above, this is a major aspect of the present invention. Although the look-up table type of embodiment, described in the Background section with respect to Figure 3, could also determine at this stage which states to include in the next verify operation, in that case the determination would be based solely on the current iteration of the loop in the write process 220, whereas here it is based on the verify result of step 225 (and potentially step 227). Depending on the results in step 225, step 221 adds higher states to be verified, as needed. Likewise, in conjunction with step 227, it removes lower state verifications as the elements being programmed to those lower states all verify and are locked out (or were determined to be bad cells and are mapped out). Once the verify set is re-established at step 221, the process again continues to step 223.
[0052] Figures 5-9 show results of simulation of the "smart verify" process for the exemplary memory embodiment, wherein the storage unit is a memory cell storing 8 states. A specific example of a non-volatile memory in which this method may be implemented is described in U.S. patents 5,712,180, 6,103,573 and 6,426,893 and U.S. patent application Serial No. 09/667,344, all incorporated by reference above. Further details on an exemplary embodiment follow the discussion of the simulation.
[0053] The "smart-verify" algorithm was simulated to move a population of 1500 8-state cells from the ground or erased (0) state to targeted program data states (1,2,3,4,5,6,7). In order to facilitize this simulation, all voltage levels are given in arbitrary units, with target threshold voltage "Vth" levels for states 1,2,3,4,5,6,7 set at values 2,3,4,5,6,7,8, respectively. The starting Vth distribution for the entire population was set to be a normal distribution with a one-σ value of 0.22 centered at - 0.25, resulting in an initial Vth spanning -1 to +lΛ. The average programming speed per programming step was set at 0.25, resulting in cells moving from one state to another in about 4 steps (and thereby allowing an entire locked out distribution for each programmed state to be confined to around that one step value). However, in order to reflect some small cell to cell variation, a spread in speeds was incorporated, which follow a normal distribution with one-σ equal to 0.015 centered at the average 0.25 speed value, resulting in speeds spanning the range 0.2 to 0.3 ΔVth per step. Throughout the entire simulation, the speed value assigned to any given cell remained unchanged. It should be noted that the assumption of a constant speed value for a given cell may not apply t all storage technologies, but in any case it is not required for the present invention to effective.
[0054] In practice, when using a uniformly increasing stepped voltage (applied, for example, to the steering gate in the exemplary memory structure) for the each subsequent step of the programming waveform, average programming speed of all cells will be more or less identical. This speed will closely match that of that above staircase program voltage stepping, once a steady state programming condition has been reached, typically within the first 6 program pulses. Consequently, use of an artificial spread in speeds is very likely a worse case condition than that which would occur in practice. Despite this, as will be seen, it presents no problem to the smart verify methodology.
[0055] The assignments of starting Vth, target data state, and speed for each cell of the 1500 cell population was done via a random-number-based shuffling, with independent shuffling for Vth distribution, data state, and speed assignments. The number of cells assigned to each of the eight states was roughly the same (-188 cells per state on the average). The entire population of to be programmed cells (i.e. states 1,2,3,4,5,6,7 with 0 being locked out), were then moved through the program verify sequence, using the "smart verify" sequence and criteria. The results of this simulation are shown in Figures 3-7.
[0056] The graph of Figure 5 a plots the number of verify (vfy) pulses or steps (303) applied to the cell population following each programming step, per the smart verify algorithm. Also shown are the minimum (Vt_min, 304) and maximum (Vt max, 305) VthS of the cell population not yet locked out, as well as the low (Vfy_lo, 301) and high (Vfy_hi, 302) verify voltage levels applied following each program step. The process begins with a number of pulses to bring the cells into a steady state before the threshold values begin to move up. The first few program pulses require only the lowest state verify, during which the Vth distribution programs up to that verify point. Thereafter, the number of verifies increases, plateauing at around the two to three verify pulse level, and dropping back down towards the one verify condition as the last few states are programmed to their corresponding targets (with all states verified and locked-out at around program pulse number 37). Throughout this sequence, the low and high verify limits of the sequential verify scans are adaptively adjusted (based on the all-lowest-state-cells verified/locked out condition and the peak Vt detection criteria, respectively) to intelligently and reliably span the appropriate, optimal data state Vth range, per the smart verify logic criteria. [0057] The utility of such an intelligent verify scan methodology is clear when looking at the complexity of what is taking place. For example, even though two verifies are enough much of the time, there is also the need to have three verifies some of the time and also possibly even require a four level verify on occasion, without which there is risk of write failure. Furthermore, it is unlikely that any tightly controlled non-adaptive, dead reckoning implementation could precisely follow the optimal transitions of Vfy lo and Vfy_hi (i.e. sliding verify window), without getting into trouble. Consequently, in order to insure a reliable write operation, the non- adaptive verify window range described with respect to Figure 3 would likely have to be guard-banded to 4 and possibly 5 verify levels per programming pulse, substantially degrading its performance advantage. Furthermore, the ability to aggressively match the adaptive approach's ability to use fewer verifies (going down to the one verify level) in the initial and final portions of the programming sequence is difficult to envision in a non-adaptive implementation.
[0058] The embodiment of Figure 5a includes a delay of two program steps following the fastest programming cells' verify at the existing maximum state verified, before adding the next state to the verify set. For example, at program step 5 the Vt_max line 305 begins to move and crosses the "Voltage' -l line of state 1 at step 6; however, only the 1 state is verified for a further two steps with the 2 state being added to the verify set at step 9, as is shown by the number of verifies (#Vfy pulses, 303) moving up to 2 at this point. The entire process is complete after step 37, including the initial five program steps.
[0059] Figure 5b is similar to Figure 5 a, but for the embodiment without the delay prior to adding the state to the verify set and without the initial five program steps. For example, after the Vt_max line 305 crosses the "Voltage"=l line of state 1 at step 2, the 2 state is added to the next verify set without delay. In this case, for most of the process there are three verifies per step, with occasional need of four verifies. This process is not as fast as that of Figure 5a, requiring a total of 100 verifies instead of 83 (if the initial four pulses of Figure 5a are neglected for comparison). The embodiment of Figure 5b is discussed further with respect to Figures 4-7. [0060] Figure 6 shows the distribution of occurrences for the range of number-of- verify pulses used in the embodiment of Figure 5b. While the 3-verify condition dominates, i.e. half of the time, the ability to drop to 2 verifies does occur about a quarter of the time, as does the need to increase to 4 verifies. On the average, around 2.7 verifies are needed per programming pulse, a figure that drops to under 2.5 for the embodiment of Figure 5 a. Assuming that the time required to perform one program operation (or step) is comparable to that for one verify operation, then, in the example of Figure 5b, the smart verify algorithm is capable of safely reducing the overall program time to 46% of the time that a full 7-step verify would require. Thus, raw programming speed roughly doubles.
[0061] Figure 7 gives a snapshot of the resulting simulated Vth distributions ("Vt") for each of the seven programming states following their lockout, as well as the starting erased or 0-state distribution, for the embodiment of Figure 5b. The distributions of each are reasonably well confined to the expected 0.25 arbitrary unit Vth range, as dictated by the algorithm.
[0062] Figure 8 gives a snapshot of the resulting simulated Vth distributions for the cell population not yet locked out at programming steps just prior to locking out all of the cells targeted for each of the seven programming states (as well as the starting distribution following the first programming pulse). This indicates how well- behaved the programming progress is for the population of cells through the programming sequence. 601 represents the initial distribution. 603 corresponds to the distribution of cells after program pulse eight, just before all targeted state 1 cells are locked out. This includes both cells with states whose ultimate destination is the 1 -state, but not yet locked out, as well as those just passing through on their way to higher states. This explains the number of cells with levels well above that for the 1 state. Similarly, 605 corresponds to program pulse 13, just before all state 2 cells lock out, and so on for the subsequent states.
[0063] Figure 9 plots the number of cells still to be programmed to their corresponding verified/locked-out conditions as a function of the number of cumulative programming pulses. Superimposed are horizontal lines indicative of the number of cells which exist in the noted range of data states. Line 701 corresponds to the number of cells with data 1, 2, 3, 4, 5, 6 or 7, line 702 corresponds to the number of cells with data 2, 3, 4, 5, 6 or 7, and so on until line 707 shows the number of cells with data 7. After the first pulse, the curve is flat until the cells with data 1 begin to lock out, after which it decreases fairly linearly until it flattens out as the straggling cells in the highest state finally lock out. As expected, on the average it takes the subsequent four programming steps to complete programming the next higher state from the point where the last state had just completed programming. However, note that the crossing points of the curve to these horizontal lines, although close, do not identically match the straight line behavior, as evidenced by the kinks in the otherwise linear curve. This is a consequence of programming speed variation from the fastest and slowest programming cells, as opposed to the statistically well-behaved progression of the general population. This again points out the importance of the adaptive, smart verify approach.
[0064] As the simulation demonstrates, the smart verify approach is effective at improving device performance while also insuring a reliable program/verify/lockout operation. It does so by providing "intelligent" means to minimize the number of sequential verify operations for each program/verify/lockout step of the write sequence. By monitoring population movement to detect both the fastest programming cell, via data unconditional verification at the highest data state level covered in the verify scan range, as well as the all-cell-lockout condition for the lowest data state covered in that scan range (thereby encompassing the slowest programming cells), the Vth scan low and high ends of the Vu, scan window can be reliably established, with minimum time wastage from extra, unneeded verify operations.
[0065] In the embodiment of Figure 5b, the raw write performance is doubled as compared to the full seven step verify approach, with even further improvement for embodiment of Figure 5a that includes the delay before introducing the next verify state in the programming sequence to the verify set. These improvements can be realized in memory systems whose programming rely upon an iterative process of progressively shifting the states of a set of storage elements operating in parallel followed by verifying the results of these shifts (or attempted shifts if an element is defective) by sensing, in parallel, a parameter indicative of each element's state. [0066] An exemplary embodiment of an implementation for the smart verify technique is described with respect to Figures 10-13. This illustrative embodiment describes a schematic implementation of the smart verify operation on a 3-bit/storage element technology (i.e. 8-states with 7-verify sequence). For this embodiment, the storage element or memory cell is of the type for which controlled, incrementally increasing storage levels, required for controlled multi-state writing, are achieved by incrementally increasing the steering gate voltage with each successive programming pulse. In addition, multi-state memory cell reading is accomplished by sequentially scanning this steering gate through a increasing progression of 7 steering gate voltage levels (corresponding to the 7 verify voltage levels used for multi-state data programming).
[0067] Figure 10 schematically illustrates one embodiment of the program- verify and lockout circuit for an individual memory element 1001 (lockout terminating programming of that element for the remainder of that programming session). The structure of Figure 10 is similar to that found in the prior art for use with an embodiment such as found described in the Background section with respect to Figures 1 and 2 and is discussed here for reference when the smart verify case is discussed. Although the memory element 1001 in this example is a floating gate transistor, other forms of storage element can be used as is discussed below. In the case of n such memory elements being programmed in parallel (where n can typically range from hundreds to thousands), there are a corresponding n of such program- verify circuits, all working concurrently. Information emanating from these n circuits form the base for the smart verify operation.
[0068] Looking at the verify/lockout schematic of Figure 10 in detail, the circuit includes both components that are common to all n circuits, highlighted by the double lined borders (e.g. COUNTER 1009, RESET 1021 and the reference voltage Ref), as well as components that are replicated in each circuit (e.g. COMPARATOR 1011, DATA STATE TO BE WRITTEN register 1019, and various logic elements). During program-verify, each memory element, 1001, is connected to a corresponding sense amp COMPARATOR 1011, which compares the conduction level of the cell to a reference source, Ref. In this embodiment, the action of this COMPARATOR 1011 is to output a "1" logic level whenever the output of SENSING PARAMETER DRIVER 1003 (e.g. providing the steering gate voltage magnitude B, 103, of Figure 2), connected to the storage element's steering gate, is less than that element's stored memory state parameter (e.g. cell Vth as exemplified by 101 in Figure 2). (In Figure 10, the waveforms at nodes A, B, C, and D respectively correspond to both the outputs of elements 1001, 1003, 1005, and 1007 and the waveforms labeled as 101, 103, 105, and 107, respectively, on Figure 2.) Alternatively, whenever the output B of SENSING PARAMETER DRIVER 1003 is greater than the element's stored memory state parameter, the COMPARATOR outputs a logic "0" level.
[0069] The progression of the SENSING PARAMETER DRIVER 1003 waveform is controlled by the COUNTER 1009, which counts from 1 to 7, to generate the 7 sequential verify pulses at node B, as exemplified by waveform 103 of Figure 2. Each cell can store one of eight possible data states {0,1,2,3,4,5,6,7}, the specific one of which, for each cell, is loaded into a corresponding DATA STATE TO BE WRITTEN register 1019. State 0 is established by a data unconditional preset operation (e.g. sector erase) to all the to-be- written cells, corresponding to phase 210 in Figure 4. If the target data for the corresponding state is to remain 0, then the LOCKOUT for that storage element is set immediately (details of which are not shown), and no programming of that element takes place. Data states 1, 2, 3, 4, 5, 6 and 7 constitute the seven programmable states, and correspond to the COUNTER 1009 related verify levels of 1, 2, 3, 4, 5, 6 and 7, respectively, which are used during program verify to establish those states. As programming progresses, the storage element parameter (e.g. storage cell Vth) is sequentially and controllably moved through states 1, 2, 3, ... until terminated by the verify/lockout operation.
[0070] The function of the three XNOR gates 1015a-c (corresponding to the 3-bit equivalent of the eight data states) feeding into the 4-input NAND gate 1017, all interposed between the COUNTER 1009 and the DATA STATE TO BE WRITTEN register 1019, is to trap the condition when a match occurs between the target DATA STATE TO BE WRITTEN and the instantaneous level being verified (via the SENSING PARAMETER DRIVER 1003), as governed by the COUNTER 1009 value. The fourth leg of the NAND comes from the COMPARATOR 1011 output, gated by a positive pulsing VERIFY STROBE circuit, 1005, which provides a time synchronized pulse of the comparator output D from the AND gate 1007, as exemplified by 107 in Figure 2. Upon the combined conditions of [1] match of COUNTER (i.e. verify level) and DATA STATE TO BE WRITTEN, and [2] COMPARATOR output high (e.g. cell Vth higher than verify level), the output of this 4-input NAND gate 1017 pulses down to a logical "0" (gated by the VERIFY STROBE 1005 pulse), remaining at logical "1" otherwise. The output of the 4-input NAND gate 1017 is fed into one leg (termed the set leg) of the LOCKOUT SR latch 1013 (implemented here in a cross-coupled NAND gate based latch). At the start of a data programming session to the addressed set of storage units, all LOCKOUT SR latches 1013 are set to a logical "0". This is accomplished by applying a RESET pulse 1021 (pulsing down to logic level "0" in this implementation, remaining at logic level" 1" otherwise) to the other leg (termed the reset leg) of all these SR latches, initializing all corresponding storage elements' LOCKOUTS to a logical "0". Upon receipt of the negative going logical "0" pulse from the 4-input NAND gate 1017, per the conditions described above, the corresponding SR latch LOCKOUT flips to a logical "1". This condition then terminates all further programming to the associated storage element for the duration of that data programming session.
[0071] By way of example, the following describes the progression of program/verify leading to lockout for a memory cell whose data state targeted is state 3, as is shown in Figure 2. Initially the cell is set to data state 0 (e.g. erased), and its corresponding LOCKOUT latch 1013 is set to logic level "0" by the RESET signal 1021. Then, starting with an initial programming level (e.g. steering or control gate voltage) pulse, it receives a series of progressively increasing level programming pulses, each pulse being followed by the 7-level verify pulse sequence, as illustrated in Figure 1. For the first few programming pulses the strobed results of this verify sequence (as exemplified by 107 in Figure 2) is all 0's (i.e. no positive going pulses). With additional programming pulses, as the cell state is pushed beyond the verify 1 level (i.e. programming into data state 1), the strobed result is a single logical "1" pulse during the level 1 verify strobe. This does not trigger the lockout condition, however, because during this time, the verify condition (i.e. COUNTER 1009 value equaling 1), does not match the targeted data state (i.e. DATA STATE TO BE WRITTEN 1019 equaling 3). When the match does occur on the verify 3 pulse, the strobed result at that point in the sequence is at "0", which inhibits setting the LOCKOUT condition.
[0072] Further program pulses push the cell state beyond the verify 2 level (i.e. programming into data state 2) resulting in a strobed result of two sequential logical "1" pulses, synchronized to the verify 1 and verify 2 strobe points. Again this does not trigger lockout, because the required matching conditions are not met. It is only after the application of further still programming pulses, which push the cell state to just beyond the verify 3 level (i.e. programming into data state 3), that the LOCKOUT condition is set to the logic level "1", terminating the application of further programming pulses to that memory cell. This occurs as follows: The strobed verify output sequence now contains three sequential logical "1" pulses, synchronized to the verify 1, verify 2 and verify 3 strobe points. During the third verify strobe, the condition of verify state (i.e. COUNTER 1009 value) and target data state are met, enabling this logical "1" pulse to be transmitted through the 4-input NAND 1017, and into the set leg of the SR LOCKOUT latch 1013.
[0073] Note that even in the event of an aberrant/excessive cell programming incident which results in state overshoot (e.g. in the above example instead of programming gradually to state 3 it suddenly overshoots and jumps to state 4), the above lockout will still take place. This is because the required COMPARATOR 1011 condition of cell Vth exceeding verify level is still met during the verify 3 strobe, thereby triggering the lockout. Consequently, no further programming takes place, limiting the degree of write failure. If lockout were not to take place in such a situation, the cell would continue to receive programming pulses to the end of the programming session, potentially sending it to VΛ levels well beyond that allowed for the highest level state, 7, resulting in a potentially more severe degree of failure.
[0074] Not shown here is the end-of-programming-session implementation. This is implemented by embodiments which signal the earlier of [1] all addresses storage elements having achieved LOCKOUT or [2] a predetermined maximum program count having been reached. More details on the verify/lockout process can be found in U.S. patent number 5,172,338 and other references incorporated above. [0075] The goal of smart verify is to dynamically reduce the number of verifies used, at any point in the programming progression, from the full 7-set sequence to the minimum necessary for reliable write operation. Figure 11 exemplifies such a minimum set in a peak verify level embodiment of the smart verify concept, wherein only verify pulses 3, 4, and 5 are issued. This would be this situation at, for example, program step 15 of the simulation shown in Figure 5b. This dictates dynamically establishing a reliable maximum and minimum verify level required for any particular point in the programming progression (e.g. 5 and 3, respectively, in the case of Figure 11). Waveforms 1101, 1103, 1105, and 1107 correspond to signals 101, 103, 105, and 107 of Figure 2, and again respectively represent the signals to the cell parameter of storage element 1001 (node A), the output of sensing parameter driver 1003 (node B), the output of the verify strobe 1005 (node C), and the output of AND gate 1007 (node D of Figure 10).
[0076] Figure 12 schematically illustrates one preferred embodiment for implementing the maximum or peak verify level when programming n memory elements in parallel. It includes an n-input OR gate 1211, with inputs 1207 coming from the corresponding D nodes of each of the n verify/lockout circuits, as represented in Figure 10 as the output of AND gate 1007. As described above, each D node will momentarily pulse to logic level "1" (strobed by the VERIFY STROBE, 1005 Figure 10), whenever the storage element state (e.g. cell VΛ parameter) exceeds the applied verify level (i.e. SENSING PARAMETER, the value at node B of Figure 10 and represented as 1103 on Figure 11). The n-input OR gate 1211 will likewise pulse to logic level "1" whenever one or more of the addressed memory elements satisfies this programming level (e.g. cell Vth) requirement. This pulsing condition is established when the instantaneous verify level, as governed by COUNTER 1249, matches the existing value of MAX VERIFY LEVEL "COUNT" REGISTER 1233, as established by an exclusive OR circuit function implemented in the three XNORs 1251a-c, thereby allowing the pulse to pass through AND gate 1253. This pulse is then fed into the NEW MAX VERIFY LEVEL "COUNT" functional block 1235 to assert the peak verify level to its next available value.
[0077] The idea behind this implementation is that, as soon as one or more storage elements pass beyond the existing peak verify level to which they are being scanned (as stored in the MAX VERIFY LEVEL "COUNT" REGISTER" 1233), the verify sequence immediately following the next programming pulse will henceforth scan up to its next available verify level. This process is represented by the flow of the dashed line directly to the LOAD NEW MAX VERIFY COUNT circuit block 1231, which instantly loads the NEW MAX VERIFY LEVEL "COUNT" into the MAX VERIFY LEVEL "COUNT" REGISTER 1233. From that point on, under the controlled pulse programming operation, it will take a number of subsequent programming pulses before one or more of the storage elements program sufficiently to once again pass this new peak verify level. Until the latter event occurs, the n-input OR gate 1211 will maintain a logical "0", thereby freezing this current maximum verify level. When the said latter event eventually does occur (e.g. after an additional four to five programming pulses), the n-input OR gate 1211 will once again output a logical "1" pulse, thereby incrementing the maximum verify level to the next higher level.
[0078] Note that if at any time the maximum verify level attempts to exceed the top of the verify range (i.e. MAXIMUM ALLOWED in circuit block 1235), then no further such increase is allowed. The maximum verify level then remains pinned to the top of the verify range (i.e. verify level 7 in this exemplary, 3-bit embodiment).
[0079] An alternative implementation to the instantaneous incrementing approach is illustrated in Figure 12 in the alternative branch, emanating directly below the NEW MAX VERIFY LEVEL "COUNT" circuit block 1235, and consisting of elements 1241, 1243, 1245, and 1247. Now, rather than following the dashed line when this NEW MAX VERIFY LEVEL "COUNT" circuit block 1235 is pulsed (i.e. when one or more storage elements have reached the existing peak verify level), instead, a program pulse counter, termed PROGRAM COUNT, is set to 0 via functional block 1241, and gets incremented by 1 with each successive programming pulse via functional blocks 1243 and 1245. Once this count reaches a prescribed "delay count" (e.g. delay count of 3), further such counting of programming pulses is stopped via functional blocks 1245 and 1247, and the NEW MAX VERIFY LEVEL "COUNT" is loaded into the MAX VERIFY LEVEL "COUNT" REGISTER 1233 via functional block 1231. The idea behind this alternate implementation is to delay the usage of the next higher verify level for a few programming pulses, since it will take more than said few pulses for the storage elements to reach and pass this next higher verify level, thereby saving additional time and further speeding up the write operation. The process represented in these blocks (1235, 1241, 1243, 1245, and 1247) can alternately be implemented through software or firmware, although a hardware implementation on the memory device is preferred rather than one depending on external, off-chip control.
[0080] The "delay count" value is preferably implemented through a settable parameter, as discussed previously, rather than having a fixed value. In a variation, the "delay count" value could be monitored by a controller and dynamically changed based upon device behavior, for example in response to programming or read errors, or operating conditions, such as temperature or power supply variations.
[0081] At the start of a full data program operation, the peak verify level is set to that associated with the first state (i.e. MAX VERIFY LEVEL "COUNT" REGISTER 1233 is set to 1). This is allowed because the state set for all the addressed storage elements prior to this program operation is state 0 (e.g. via an erase operation), and it will take a number of programming pulses before any of these cells reach the verify level associated with this first state.
[0082] Figure 13 schematically illustrates one preferred embodiment for implementing the minimum verify level when programming n storage elements in parallel. It depicts n circuit blocks (1301-1 to 1301-n) that operate in parallel; one block for each of the n concurrently addressed storage elements. Each said circuit block includes existing circuit portions of the corresponding n verify/lockout circuits described in Figure 10. As with Figure 10, those circuit blocks which are common to all n circuits are highlighted by the double lined borders (.e.g. the MIN VERIFY LEVEL "COUNT" REGISTER 1305). Each said circuit block 1301-/ (1 ≤i <n) contains a matching circuit (matching DATA STATE TO BE WRITTEN 1019 with ML VERIFY LEVEL), which consists of an exclusive-or circuit function, built from three XNOR 1331a-c gates feeding into a 3-input NAND gate 1333 for the exemplary 3-bit implementation.
[0083] The purpose of this matching circuit to ignore the status of all storage elements whose target data do not match that associated with the current minimum verify level. In does this by outputting a logical level "1" to the lower input leg of the 2-input OR gate 1339. This is then transmitted to the n +1 input AND gate 1313, and thereby does not interfere with the decision process.
[0084] In the case of a match (i.e. the storage element target data matches that associated with this minimum verify level), the output result of the 2-input OR gate 1339 rests with the logic level presented to its upper input leg, which is fed from LOCKOUT functional circuit block 1303. Given a match, if the associated storage element's target state has in fact been reached, as flagged by the LOCKOUT 1303 set to a logical "1", the transmitted result of the 2-input OR gate 1339 becomes a logical "1". Otherwise the transmitted result of that OR gate remains at logical "0". What this circuit does is isolate any storage elements whose target data matches the current minimum verify level and have not yet locked out, thereby transmitting a logical "0" to the n+1 input AND gate 1313. If there exists even one such storage element, this will result in a strobed logical "0" at the output of the n+1 input AND gate 1313. It is only when all such cells have locked out that a logical "1" strobed pulse is output by the n+1 input AND gate 1313. Strobing is implemented by VERIFY STROBE functional block 1005, which feeds into AND gate 1313 as well.
[0085] The output of this the n+1 input AND gate 1313 is fed into a series of two functional circuit blocks. The first circuit block 1315, termed NEW MIN VERIFY LEVEL "COUNT", will, upon receiving a logical "1" pulse, increment the existing minimum verify level by one. The following block 1317 then loads this new minimum value into the MIN VERIFY LEVEL "COUNT" REGISTER 1305, for use in subsequent program/verify series. Note that if at any time there are no storage elements targeted to the data state associated with the current minimum verify level, the embodiment of Figure 13 will likewise increment this minimum verify level to that of the next higher data state for the following program/verify operations.
[0086] Note that if at any time the minimum verify level attempts to exceed the top of the verify range (i.e. MAXIMUM ALLOWED), then no further such increase is allowed. The minimum verify level then remains pinned to the top of the verify range (i.e. verify level 7 in this embodiment).
[0087] The underlying idea here is that, prior to all storage elements which are targeted to be written to the data state corresponding to the lowest verify level currently in use actually reaching this data state (as indicated by their corresponding LOCKOUT status), this same lowest verify level must continue to be used in the subsequent program/verify operation. Once all such cells have in fact so programmed (as testified to by all LOCKOUTS having flipped to logical "1" state), then henceforth there is no purpose to continue verifying at this same low end verify point, and the minimum verify level for the following program/verify operations can start at the next higher level.
[0088] At the start of a full data program operation, the minimum verify level is set to that associated with the first state (i.e. MIN VERIFY LEVEL "COUNT" REGISTER 1305 is set to 1), in preparation for cells to be programmed up to this verify level.
[0089] During use of the above peak verify and minimum verify embodiments in combination, the number of verify pulses following each programming pulse is dynamically kept to the minimum required at any point in the programming sequence. Typically, at the start of a program session, MAX and MIN verify levels will be both at state 1. After a number of pulses, MAX will increase to stay above the fastest programming cells, independently, at some later point MIN will also increase, as all cells targeted for the prior minimum state have so programmed (and locked out). For this 8-state embodiment, spanning a seven step sequential verify range, this continual dynamic readjustment of max and min allows the average number of verifies required to be less than half that value (e.g. ~< 3 verifies per program step on the average). As cells program up to the highest states, the maximum verify level gets pinned to the high end limit, 7, and at some later point the minimum verify level also gets pinned to this limit. Examples of such operating behavior are shown in Figures 5a and 5b of the disclosure.
[0090] Although the determination of the scan window is described mainly with respect to the time savings it provides when the states to be verified are checked sequentially, the present invention could also be implemented in embodiments where the multi-states are verified in parallel, such as is described in U.S. patent application serial number 09/671,793 incorporated above. In the parallel case, although this may not result in the same advantage in terms of increased speed, it may have other advantages, such as a decrease in power consumption.
[0091] Although the discussion so far has referred mainly to multi-state embodiments using a charge storing device, such as floating gate EEPROM or FLASH cells, for the memory device, it can be applied to other multi-state embodiments as well, including magnetic and optical media, as well as volatile storage media such as multi-state DRAM. As the particulars of how the storage elements are read, are written to, and store data do not enter into the main aspects of the present invention, the various aspects of the present invention may be applied to other memory types, including, but not limited to, sub O.lum transistors, single electron transistors, organic/carbon based nano-transistors, and molecular transistors. For example, NROM and MNOS cells, such as those respectively described in U.S. patent 5,768,192 of Eitan and U.S. patent number 4,630,086 of Sato et al., or magnetic RAM and FRAM cells, such as those respectively described in U.S. patent 5,991,193 of Gallagher et al. and U.S. patent number 5,892,706 of Shimizu et al., all of which are hereby incorporated herein by this reference, could also be used.
[0092] Although the invention has been described with respect to various exemplary embodiments, it will be understood that the invention is entitled to protection within the full scope of the appended claims.

Claims

IT IS CLAIMED:
1. A method of operating a non-volatile memory having a plurality of multi-state storage elements, comprising: applying a first programming pulse to selected ones of said storage elements; verifying the result of said first programming pulse on said selected storage elements for a first subset of said multi-state levels; forming a second subset of said multi-state levels based on the results of said verifying, comprising determining whether to include in said second subset one of said multi-state levels not included in the first subset; subsequent to said verifying, applying a second programming pulse to one or more of said selected storage elements; and verifying the result of said second programming pulse on said one or more of said selected storage elements for the second subset of said multi-state levels.
2. The method of claim 1, wherein the application of further programming pulse is terminated to those of said selected storage elements that verify at a respective target value in said verifying the result of said first programming pulse.
3. The method of claim 1, wherein said forming a second subset of said multi-state levels based on said verifying further comprises determining whether to exclude in said second subset one of said multi-state levels included in the first subset.
4. A method of performing a programming operation on a plurality of multi-state data storage elements, comprising: performing a programming operation to incrementally move the storage elements from a first data state sequentially through a plurality of second data states; verifying the result of the preceding programming operation for a subset of one or more target values from a set of target values each corresponding to a respective second data state; subsequently re-establishing said subset of one or more of said target values for a subsequent verify operation based on the result of the preceding verifying, comprising determining whether to include a target value not in the subset of the preceding verifying; and subsequently repeating the performing a programming operation and the verifying using said re-established subset of target values.
5. The method of claim 4, further comprising: terminating further programming of those of said plurality of storage elements that verify at their respective target value in said verifying the result of the preceding programming operation.
6. The method of claim 4, wherein said verifying the result comprises sequentially comparing the result of the preceding programming operation against the subset of target values.
7. The method of claim 4, wherein said subsequently reestablished subset of target values is the same as the preceding subset of target values.
8. The method of claim 4, wherein subsequently re-establishing said subset of target values further comprises determining whether to delete a target value in the subset of the preceding verifying.
9. The method of claim 4, wherein said performing a programming operation comprising pulsing the storage elements with a programming voltage.
10. The method of claim 9, wherein said storage elements are EEPROM memory cells and said verifying comprises comparing a parameter indicative of the threshold values of the memory cells against the subset of target values, wherein said target values are values of said parameter.
11. The method of claim 4, further comprising, subsequent to the repeating the performing a programming operation and the verifying using the reestablished subset, repeating one or more times: subsequently re-establishing said subset of one or more target values for a subsequent verify operation based on the result of the preceding verifying, comprising determining whether to include a target value not in the subset of the preceding verifying; and subsequently repeating the performing a programming operation.
12. The method of claim 11 , further comprising: removing from the plurality of multi-state data storage elements those of said storage elements that fail to program properly.
13. The method of claim 11, wherein said determining whether to include a target value N not in the subset of target values of the preceding verifying is based on one or more of said storage elements verifying at one of said subset of target values in said preceding verifying.
14. The method of claim 13, wherein the target value N in the sequence of the second data states is included in the subset of target values in response to one or more of said storage elements verifying at the target value (N-1) in the sequence of the second data states.
15. The method of claim 14, wherein a target value N is included in the verify subset a first number of programming operations after one or more of said storage elements verifying at the target value (N-1) in the preceding verifying.
16. The method of claim 15, wherein said first number is a settable parameter.
17. A memory comprising: a plurality of multi-state storage elements; programming circuitry connectable to the storage units to perform a program operation whereby the state of storage elements can be changed; sensing circuitry connectable to the storage elements to determine the value of a parameter indicative of the state of the storage elements; comparison circuitry connected to the sensing circuitry for performing a program verify operation using target values for said parameter corresponding to a subset of the multi-state levels; and logic circuitry connected to the comparison circuitry, wherein adding of one or more multi-state levels to the subset of the multi-state levels that are used in the program verify operation is determined based on the results of the preceding program verify operation.
18. The memory of claim 17, wherein in a program verify operation the comparison circuitry compares state of said storage elements to the target values sequentially.
19. The logic circuitry of claim 17, wherein deletion of one or more multi-state levels from the set of the multi-state levels that are used in the program verify operation is determined based on the results of the preceding program verify operation.
20. The memory of claim 17, wherein the logic circuitry locks out from further programming storage elements that correctly verify to their respective target values in the program verify operation.
21. The memory of claim 17, wherein the storage elements are floating gate memory cells.
EP03787219A 2002-12-05 2003-12-01 Smart verify for multi-state memories Expired - Lifetime EP1568041B1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US314055 2002-12-05
US10/314,055 US7073103B2 (en) 2002-12-05 2002-12-05 Smart verify for multi-state memories
PCT/US2003/038076 WO2004053882A1 (en) 2002-12-05 2003-12-01 Smart verify for multi-state memories

Publications (2)

Publication Number Publication Date
EP1568041A1 true EP1568041A1 (en) 2005-08-31
EP1568041B1 EP1568041B1 (en) 2007-03-21

Family

ID=32468407

Family Applications (1)

Application Number Title Priority Date Filing Date
EP03787219A Expired - Lifetime EP1568041B1 (en) 2002-12-05 2003-12-01 Smart verify for multi-state memories

Country Status (10)

Country Link
US (3) US7073103B2 (en)
EP (1) EP1568041B1 (en)
JP (1) JP4382675B2 (en)
KR (1) KR101017321B1 (en)
CN (1) CN1720586B (en)
AT (1) ATE357727T1 (en)
AU (1) AU2003296003A1 (en)
DE (1) DE60312729T2 (en)
TW (1) TWI314325B (en)
WO (1) WO2004053882A1 (en)

Families Citing this family (219)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7630237B2 (en) 2003-02-06 2009-12-08 Sandisk Corporation System and method for programming cells in non-volatile integrated memory devices
US7574341B1 (en) * 2003-11-12 2009-08-11 Hewlett-Packard Development Company, L.P. Speculative expectation based event verification
US7418678B1 (en) * 2003-12-01 2008-08-26 Jasper Design Automation, Inc. Managing formal verification complexity of designs with counters
US7355237B2 (en) * 2004-02-13 2008-04-08 Sandisk Corporation Shield plate for limiting cross coupling between floating gates
US7023733B2 (en) * 2004-05-05 2006-04-04 Sandisk Corporation Boosting to control programming of non-volatile memory
US7490283B2 (en) 2004-05-13 2009-02-10 Sandisk Corporation Pipelined data relocation and improved chip architectures
US7535771B2 (en) * 2004-11-04 2009-05-19 Macronix International Co., Ltd. Devices and methods to improve erase uniformity and to screen for marginal cells for NROM memories
US7158421B2 (en) * 2005-04-01 2007-01-02 Sandisk Corporation Use of data latches in multi-phase programming of non-volatile memories
US7120051B2 (en) * 2004-12-14 2006-10-10 Sandisk Corporation Pipelined programming of non-volatile memories using early data
US7420847B2 (en) * 2004-12-14 2008-09-02 Sandisk Corporation Multi-state memory having data recovery after program fail
US7849381B2 (en) * 2004-12-21 2010-12-07 Sandisk Corporation Method for copying data in reprogrammable non-volatile memory
US7403424B2 (en) * 2005-03-31 2008-07-22 Sandisk Corporation Erasing non-volatile memory using individual verification and additional erasing of subsets of memory cells
US7463521B2 (en) 2005-04-01 2008-12-09 Sandisk Corporation Method for non-volatile memory with managed execution of cached data
US7447078B2 (en) * 2005-04-01 2008-11-04 Sandisk Corporation Method for non-volatile memory with background data latch caching during read operations
US7206230B2 (en) * 2005-04-01 2007-04-17 Sandisk Corporation Use of data latches in cache operations of non-volatile memories
US7339834B2 (en) * 2005-06-03 2008-03-04 Sandisk Corporation Starting program voltage shift with cycling of non-volatile memory
EP1748446A1 (en) * 2005-07-28 2007-01-31 STMicroelectronics S.r.l. Two pages programming
US7362616B2 (en) * 2005-07-28 2008-04-22 Stmicroelectronics S.R.L. NAND flash memory with erase verify based on shorter evaluation time
ATE521972T1 (en) * 2005-08-01 2011-09-15 Sandisk Corp PROGRAMMING A NON-VOLATILE MEMORY WITH SELF-REGULATING MAXIMUM PROGRAM LOOP
US7230854B2 (en) * 2005-08-01 2007-06-12 Sandisk Corporation Method for programming non-volatile memory with self-adjusting maximum program loop
US7023737B1 (en) * 2005-08-01 2006-04-04 Sandisk Corporation System for programming non-volatile memory with self-adjusting maximum program loop
US7301817B2 (en) 2005-10-27 2007-11-27 Sandisk Corporation Method for programming of multi-state non-volatile memory using smart verify
WO2007050976A1 (en) * 2005-10-27 2007-05-03 Sandisk Corporation Method for programming of multi-state non-volatile memory using smart verify
US7366022B2 (en) * 2005-10-27 2008-04-29 Sandisk Corporation Apparatus for programming of multi-state non-volatile memory using smart verify
US7349264B2 (en) 2005-12-28 2008-03-25 Sandisk Corporation Alternate sensing techniques for non-volatile memories
US7616481B2 (en) 2005-12-28 2009-11-10 Sandisk Corporation Memories with alternate sensing techniques
US7224614B1 (en) 2005-12-29 2007-05-29 Sandisk Corporation Methods for improved program-verify operations in non-volatile memories
US7310255B2 (en) * 2005-12-29 2007-12-18 Sandisk Corporation Non-volatile memory with improved program-verify operations
US8239735B2 (en) 2006-05-12 2012-08-07 Apple Inc. Memory Device with adaptive capacity
US7697326B2 (en) 2006-05-12 2010-04-13 Anobit Technologies Ltd. Reducing programming error in memory devices
US8156403B2 (en) 2006-05-12 2012-04-10 Anobit Technologies Ltd. Combined distortion estimation and error correction coding for memory devices
CN103258572B (en) 2006-05-12 2016-12-07 苹果公司 Distortion estimation in storage device and elimination
US7486561B2 (en) 2006-06-22 2009-02-03 Sandisk Corporation Method for non-real time reprogramming of non-volatile memory to achieve tighter distribution of threshold voltages
US7489549B2 (en) * 2006-06-22 2009-02-10 Sandisk Corporation System for non-real time reprogramming of non-volatile memory to achieve tighter distribution of threshold voltages
US7304893B1 (en) 2006-06-30 2007-12-04 Sandisk Corporation Method of partial page fail bit detection in flash memory devices
US7355892B2 (en) * 2006-06-30 2008-04-08 Sandisk Corporation Partial page fail bit detection in flash memory devices
WO2008026203A2 (en) 2006-08-27 2008-03-06 Anobit Technologies Estimation of non-linear distortion in memory devices
US7525838B2 (en) * 2006-08-30 2009-04-28 Samsung Electronics Co., Ltd. Flash memory device and method for programming multi-level cells in the same
US7602650B2 (en) * 2006-08-30 2009-10-13 Samsung Electronics Co., Ltd. Flash memory device and method for programming multi-level cells in the same
US7606966B2 (en) * 2006-09-08 2009-10-20 Sandisk Corporation Methods in a pseudo random and command driven bit compensation for the cycling effects in flash memory
US7734861B2 (en) * 2006-09-08 2010-06-08 Sandisk Corporation Pseudo random and command driven bit compensation for the cycling effects in flash memory
US7885112B2 (en) * 2007-09-07 2011-02-08 Sandisk Corporation Nonvolatile memory and method for on-chip pseudo-randomization of data within a page and between pages
JP4990978B2 (en) 2006-10-13 2012-08-01 サンディスク コーポレイション Partial erasure and erase verification in non-volatile memory devices
WO2008048810A2 (en) 2006-10-13 2008-04-24 Sandisk Corporation Partitioned soft programming in non-volatile memory
US7975192B2 (en) 2006-10-30 2011-07-05 Anobit Technologies Ltd. Reading memory cells using multiple thresholds
CN101601094B (en) 2006-10-30 2013-03-27 苹果公司 Reading memory cells using multiple thresholds
US7924648B2 (en) 2006-11-28 2011-04-12 Anobit Technologies Ltd. Memory power and performance management
US8151163B2 (en) 2006-12-03 2012-04-03 Anobit Technologies Ltd. Automatic defect management in memory devices
US7900102B2 (en) 2006-12-17 2011-03-01 Anobit Technologies Ltd. High-speed programming of memory devices
US7570520B2 (en) * 2006-12-27 2009-08-04 Sandisk Corporation Non-volatile storage system with initial programming voltage based on trial
US7551482B2 (en) * 2006-12-27 2009-06-23 Sandisk Corporation Method for programming with initial programming voltage based on trial
US8296623B2 (en) * 2007-01-05 2012-10-23 California Institute Of Technology Codes for limited magnitude asymmetric errors in flash memories
US8151166B2 (en) 2007-01-24 2012-04-03 Anobit Technologies Ltd. Reduction of back pattern dependency effects in memory devices
US7751240B2 (en) 2007-01-24 2010-07-06 Anobit Technologies Ltd. Memory device with negative thresholds
EP2348511B1 (en) 2007-02-20 2014-08-13 SanDisk Technologies, Inc. Variable program for non-volatile storage
US7616500B2 (en) * 2007-02-20 2009-11-10 Sandisk Corporation Non-volatile storage apparatus with multiple pass write sequence
KR101371522B1 (en) * 2007-02-27 2014-03-12 삼성전자주식회사 Nonvolatile memory device and driving method thereof
CN101715595A (en) 2007-03-12 2010-05-26 爱诺彼得技术有限责任公司 Adaptive estimation of memory cell read thresholds
KR100816220B1 (en) * 2007-03-14 2008-03-21 주식회사 하이닉스반도체 The detecting method for under program cell of non volatile memory device and the programming method using the same
US8001320B2 (en) 2007-04-22 2011-08-16 Anobit Technologies Ltd. Command interface for memory devices
US8234545B2 (en) 2007-05-12 2012-07-31 Apple Inc. Data storage with incremental redundancy
WO2008139441A2 (en) 2007-05-12 2008-11-20 Anobit Technologies Ltd. Memory device with internal signal processing unit
US7925936B1 (en) 2007-07-13 2011-04-12 Anobit Technologies Ltd. Memory device with non-uniform programming levels
US7898885B2 (en) * 2007-07-19 2011-03-01 Micron Technology, Inc. Analog sensing of memory cells in a solid state memory device
US7649782B2 (en) * 2007-07-31 2010-01-19 Freescale Semiconductor, Inc. Non-volatile memory having a dynamically adjustable soft program verify voltage level and method therefor
US8259497B2 (en) 2007-08-06 2012-09-04 Apple Inc. Programming schemes for multi-level analog memory cells
US7869273B2 (en) 2007-09-04 2011-01-11 Sandisk Corporation Reducing the impact of interference during programming
US7813188B2 (en) * 2007-09-10 2010-10-12 Hynix Semiconductor Inc. Non-volatile memory device and a method of programming a multi level cell in the same
US8174905B2 (en) 2007-09-19 2012-05-08 Anobit Technologies Ltd. Programming orders for reducing distortion in arrays of multi-level analog memory cells
KR100891405B1 (en) * 2007-09-27 2009-04-02 주식회사 하이닉스반도체 Non volatile memory device and method for operating thereof
US7773413B2 (en) 2007-10-08 2010-08-10 Anobit Technologies Ltd. Reliable data storage in analog memory cells in the presence of temperature variations
US8000141B1 (en) 2007-10-19 2011-08-16 Anobit Technologies Ltd. Compensation for voltage drifts in analog memory cells
US8068360B2 (en) 2007-10-19 2011-11-29 Anobit Technologies Ltd. Reading analog memory cells using built-in multi-threshold commands
US8527819B2 (en) 2007-10-19 2013-09-03 Apple Inc. Data storage in analog memory cell arrays having erase failures
US8270246B2 (en) 2007-11-13 2012-09-18 Apple Inc. Optimized selection of memory chips in multi-chips memory devices
JP2009129480A (en) * 2007-11-20 2009-06-11 Toshiba Corp Method of controlling threshold in nonvolatile semiconductor memory device
DE102007055479B4 (en) * 2007-11-21 2015-09-10 Audi Ag Node element for a truss construction
US8225181B2 (en) 2007-11-30 2012-07-17 Apple Inc. Efficient re-read operations from memory devices
JP5151439B2 (en) * 2007-12-12 2013-02-27 ソニー株式会社 Storage device and information re-recording method
US8209588B2 (en) 2007-12-12 2012-06-26 Anobit Technologies Ltd. Efficient interference cancellation in analog memory cell arrays
US8456905B2 (en) 2007-12-16 2013-06-04 Apple Inc. Efficient data storage in multi-plane memory devices
US8085586B2 (en) 2007-12-27 2011-12-27 Anobit Technologies Ltd. Wear level estimation in analog memory cells
US7916544B2 (en) 2008-01-25 2011-03-29 Micron Technology, Inc. Random telegraph signal noise reduction scheme for semiconductor memories
US8156398B2 (en) 2008-02-05 2012-04-10 Anobit Technologies Ltd. Parameter estimation based on error correction code parity check equations
US20090199058A1 (en) * 2008-02-06 2009-08-06 Christoph Seidl Programmable memory with reliability testing of the stored data
US7924587B2 (en) 2008-02-21 2011-04-12 Anobit Technologies Ltd. Programming of analog memory cells using a single programming pulse per state transition
US7864573B2 (en) 2008-02-24 2011-01-04 Anobit Technologies Ltd. Programming analog memory cells for reduced variance after retention
ITRM20080114A1 (en) * 2008-02-29 2009-09-01 Micron Technology Inc COMPENSATION OF CHARGE LOSS DURING THE PROGRAMMING OF A MEMORY DEVICE.
US8230300B2 (en) 2008-03-07 2012-07-24 Apple Inc. Efficient readout from analog memory cells using data compression
US8400858B2 (en) 2008-03-18 2013-03-19 Apple Inc. Memory device with reduced sense time readout
US8059457B2 (en) 2008-03-18 2011-11-15 Anobit Technologies Ltd. Memory device with multiple-accuracy read commands
KR100954949B1 (en) * 2008-05-14 2010-04-27 주식회사 하이닉스반도체 Multi level cell programming method of non volatile memory device
US8433980B2 (en) * 2008-06-23 2013-04-30 Sandisk Il Ltd. Fast, low-power reading of data in a flash memory
US8498151B1 (en) 2008-08-05 2013-07-30 Apple Inc. Data storage in analog memory cells using modified pass voltages
US7924613B1 (en) 2008-08-05 2011-04-12 Anobit Technologies Ltd. Data storage in analog memory cells with protection against programming interruption
US8949684B1 (en) 2008-09-02 2015-02-03 Apple Inc. Segmented data storage
US8169825B1 (en) 2008-09-02 2012-05-01 Anobit Technologies Ltd. Reliable data storage in analog memory cells subjected to long retention periods
JP5172555B2 (en) 2008-09-08 2013-03-27 株式会社東芝 Semiconductor memory device
US8482978B1 (en) 2008-09-14 2013-07-09 Apple Inc. Estimation of memory cell read thresholds by sampling inside programming level distribution intervals
US8000135B1 (en) 2008-09-14 2011-08-16 Anobit Technologies Ltd. Estimation of memory cell read thresholds by sampling inside programming level distribution intervals
KR101532754B1 (en) 2008-09-22 2015-07-02 삼성전자주식회사 Programming method of nonvolatile memory device
US7768836B2 (en) * 2008-10-10 2010-08-03 Sandisk Corporation Nonvolatile memory and method with reduced program verify by ignoring fastest and/or slowest programming bits
US8239734B1 (en) 2008-10-15 2012-08-07 Apple Inc. Efficient data storage in storage device arrays
US8045375B2 (en) * 2008-10-24 2011-10-25 Sandisk Technologies Inc. Programming non-volatile memory with high resolution variable initial programming pulse
US8261159B1 (en) 2008-10-30 2012-09-04 Apple, Inc. Data scrambling schemes for memory devices
US8208304B2 (en) 2008-11-16 2012-06-26 Anobit Technologies Ltd. Storage at M bits/cell density in N bits/cell analog memory cell devices, M>N
US8174857B1 (en) 2008-12-31 2012-05-08 Anobit Technologies Ltd. Efficient readout schemes for analog memory cell devices using multiple read threshold sets
US8248831B2 (en) 2008-12-31 2012-08-21 Apple Inc. Rejuvenation of analog memory cells
US8924661B1 (en) 2009-01-18 2014-12-30 Apple Inc. Memory system including a controller and processors associated with memory devices
US8111544B2 (en) * 2009-02-23 2012-02-07 Taiwan Semiconductor Manufacturing Company, Ltd. Programming MRAM cells using probability write
US8228701B2 (en) 2009-03-01 2012-07-24 Apple Inc. Selective activation of programming schemes in analog memory cell arrays
KR101005145B1 (en) * 2009-03-06 2011-01-04 주식회사 하이닉스반도체 Method of programming a non volatile memory device
US8259506B1 (en) 2009-03-25 2012-09-04 Apple Inc. Database of memory read thresholds
US8832354B2 (en) 2009-03-25 2014-09-09 Apple Inc. Use of host system resources by memory controller
US8238157B1 (en) 2009-04-12 2012-08-07 Apple Inc. Selective re-programming of analog memory cells
KR101015644B1 (en) * 2009-05-29 2011-02-22 주식회사 하이닉스반도체 Nonvolatile memory device and method of programing the same
US8054691B2 (en) 2009-06-26 2011-11-08 Sandisk Technologies Inc. Detecting the completion of programming for non-volatile storage
US8479080B1 (en) 2009-07-12 2013-07-02 Apple Inc. Adaptive over-provisioning in memory systems
US8495465B1 (en) 2009-10-15 2013-07-23 Apple Inc. Error correction coding over multiple memory pages
US8243520B2 (en) * 2009-11-02 2012-08-14 Infineon Technologies Ag Non-volatile memory with predictive programming
US8223556B2 (en) * 2009-11-25 2012-07-17 Sandisk Technologies Inc. Programming non-volatile memory with a reduced number of verify operations
US8174895B2 (en) 2009-12-15 2012-05-08 Sandisk Technologies Inc. Programming non-volatile storage with fast bit detection and verify skip
US8677054B1 (en) 2009-12-16 2014-03-18 Apple Inc. Memory management schemes for non-volatile memory devices
US8694814B1 (en) 2010-01-10 2014-04-08 Apple Inc. Reuse of host hibernation storage space by memory controller
US8572311B1 (en) 2010-01-11 2013-10-29 Apple Inc. Redundant data storage in multi-die memory systems
KR101676816B1 (en) * 2010-02-11 2016-11-18 삼성전자주식회사 Flash memory device and program method thereof
US8233324B2 (en) 2010-03-25 2012-07-31 Sandisk Il Ltd. Simultaneous multi-state read or verify in non-volatile storage
US8218366B2 (en) 2010-04-18 2012-07-10 Sandisk Technologies Inc. Programming non-volatile storage including reducing impact from other memory cells
US8694853B1 (en) 2010-05-04 2014-04-08 Apple Inc. Read commands for reading interfering memory cells
US8416624B2 (en) 2010-05-21 2013-04-09 SanDisk Technologies, Inc. Erase and programming techniques to reduce the widening of state distributions in non-volatile memories
US8572423B1 (en) 2010-06-22 2013-10-29 Apple Inc. Reducing peak current in memory systems
US8432732B2 (en) 2010-07-09 2013-04-30 Sandisk Technologies Inc. Detection of word-line leakage in memory arrays
US8514630B2 (en) 2010-07-09 2013-08-20 Sandisk Technologies Inc. Detection of word-line leakage in memory arrays: current based approach
US8305807B2 (en) 2010-07-09 2012-11-06 Sandisk Technologies Inc. Detection of broken word-lines in memory arrays
US8595591B1 (en) 2010-07-11 2013-11-26 Apple Inc. Interference-aware assignment of programming levels in analog memory cells
US9104580B1 (en) 2010-07-27 2015-08-11 Apple Inc. Cache memory for hybrid disk drives
US8645794B1 (en) 2010-07-31 2014-02-04 Apple Inc. Data storage in analog memory cells using a non-integer number of bits per cell
US8856475B1 (en) 2010-08-01 2014-10-07 Apple Inc. Efficient selection of memory blocks for compaction
US8310870B2 (en) 2010-08-03 2012-11-13 Sandisk Technologies Inc. Natural threshold voltage distribution compaction in non-volatile memory
US8694854B1 (en) 2010-08-17 2014-04-08 Apple Inc. Read threshold setting based on soft readout statistics
US9021181B1 (en) 2010-09-27 2015-04-28 Apple Inc. Memory management for unifying memory cell conditions by using maximum time intervals
US8374031B2 (en) 2010-09-29 2013-02-12 SanDisk Technologies, Inc. Techniques for the fast settling of word lines in NAND flash memory
US8345482B2 (en) * 2010-12-15 2013-01-01 Micron Technology, Inc. Methods for segmented programming and memory devices
US8472280B2 (en) 2010-12-21 2013-06-25 Sandisk Technologies Inc. Alternate page by page programming scheme
KR101211840B1 (en) * 2010-12-30 2012-12-12 에스케이하이닉스 주식회사 Program method of semiconductor memory device
US8379454B2 (en) 2011-05-05 2013-02-19 Sandisk Technologies Inc. Detection of broken word-lines in memory arrays
US8843693B2 (en) 2011-05-17 2014-09-23 SanDisk Technologies, Inc. Non-volatile memory and method with improved data scrambling
US8456911B2 (en) 2011-06-07 2013-06-04 Sandisk Technologies Inc. Intelligent shifting of read pass voltages for non-volatile storage
US8432740B2 (en) 2011-07-21 2013-04-30 Sandisk Technologies Inc. Program algorithm with staircase waveform decomposed into multiple passes
US8750042B2 (en) 2011-07-28 2014-06-10 Sandisk Technologies Inc. Combined simultaneous sensing of multiple wordlines in a post-write read (PWR) and detection of NAND failures
US8726104B2 (en) 2011-07-28 2014-05-13 Sandisk Technologies Inc. Non-volatile memory and method with accelerated post-write read using combined verification of multiple pages
US8775901B2 (en) 2011-07-28 2014-07-08 SanDisk Technologies, Inc. Data recovery for defective word lines during programming of non-volatile memory arrays
KR20130019082A (en) * 2011-08-16 2013-02-26 삼성전자주식회사 Method of designing nonvolatile memory device
US9361986B2 (en) 2011-09-19 2016-06-07 Sandisk Technologies Inc. High endurance non-volatile storage
WO2013074528A1 (en) 2011-11-18 2013-05-23 SanDisk Technologies, Inc. Non-volatile storage with broken word line screen and data recovery
US9036415B2 (en) 2011-12-21 2015-05-19 Sandisk Technologies Inc. Mitigating variations arising from simultaneous multi-state sensing
US8842471B2 (en) 2012-01-06 2014-09-23 Sandisk Technologies Inc. Charge cycling by equalizing and regulating the source, well, and bit line levels during write operations for NAND flash memory: program to verify transition
US8582381B2 (en) 2012-02-23 2013-11-12 SanDisk Technologies, Inc. Temperature based compensation during verify operations for non-volatile storage
US8730722B2 (en) 2012-03-02 2014-05-20 Sandisk Technologies Inc. Saving of data in cases of word-line to word-line short in memory arrays
US8937835B2 (en) 2012-03-13 2015-01-20 Sandisk Technologies Inc. Non-volatile storage with read process that reduces disturb
JP5398872B2 (en) * 2012-04-27 2014-01-29 株式会社東芝 Semiconductor memory device
US8937837B2 (en) 2012-05-08 2015-01-20 Sandisk Technologies Inc. Bit line BL isolation scheme during erase operation for non-volatile storage
US9142305B2 (en) 2012-06-28 2015-09-22 Sandisk Technologies Inc. System to reduce stress on word line select transistor during erase operation
US9053819B2 (en) 2012-07-11 2015-06-09 Sandisk Technologies Inc. Programming method to tighten threshold voltage width with avoiding program disturb
US8750045B2 (en) 2012-07-27 2014-06-10 Sandisk Technologies Inc. Experience count dependent program algorithm for flash memory
JP2014053060A (en) 2012-09-07 2014-03-20 Toshiba Corp Semiconductor storage device and control method of the same
US20140071761A1 (en) 2012-09-10 2014-03-13 Sandisk Technologies Inc. Non-volatile storage with joint hard bit and soft bit reading
JP2014063551A (en) 2012-09-21 2014-04-10 Toshiba Corp Semiconductor memory device
US9810723B2 (en) 2012-09-27 2017-11-07 Sandisk Technologies Llc Charge pump based over-sampling ADC for current detection
US9164526B2 (en) 2012-09-27 2015-10-20 Sandisk Technologies Inc. Sigma delta over-sampling charge pump analog-to-digital converter
US20140108705A1 (en) 2012-10-12 2014-04-17 Sandisk Technologies Inc. Use of High Endurance Non-Volatile Memory for Read Acceleration
US8885416B2 (en) 2013-01-30 2014-11-11 Sandisk Technologies Inc. Bit line current trip point modulation for reading nonvolatile storage elements
US8929142B2 (en) * 2013-02-05 2015-01-06 Sandisk Technologies Inc. Programming select gate transistors and memory cells using dynamic verify level
US9311999B2 (en) * 2013-09-06 2016-04-12 Micron Technology, Inc. Memory sense amplifiers and memory verification methods
US9165683B2 (en) 2013-09-23 2015-10-20 Sandisk Technologies Inc. Multi-word line erratic programming detection
GB2518632A (en) * 2013-09-26 2015-04-01 Ibm Estimation of level-thresholds for memory cells
US9620238B2 (en) 2014-01-20 2017-04-11 Sandisk Technologies Llc Methods and systems that selectively inhibit and enable programming of non-volatile storage elements
JP2015204126A (en) 2014-04-16 2015-11-16 株式会社東芝 Semiconductor storage device
US9460809B2 (en) 2014-07-10 2016-10-04 Sandisk Technologies Llc AC stress mode to screen out word line to word line shorts
US9443612B2 (en) 2014-07-10 2016-09-13 Sandisk Technologies Llc Determination of bit line to low voltage signal shorts
US9484086B2 (en) 2014-07-10 2016-11-01 Sandisk Technologies Llc Determination of word line to local source line shorts
US9514835B2 (en) 2014-07-10 2016-12-06 Sandisk Technologies Llc Determination of word line to word line shorts between adjacent blocks
US9218874B1 (en) 2014-08-11 2015-12-22 Sandisk Technologies Inc. Multi-pulse programming cycle of non-volatile memory for enhanced de-trapping
US9202593B1 (en) 2014-09-02 2015-12-01 Sandisk Technologies Inc. Techniques for detecting broken word lines in non-volatile memories
US9240249B1 (en) 2014-09-02 2016-01-19 Sandisk Technologies Inc. AC stress methods to screen out bit line defects
US9449694B2 (en) 2014-09-04 2016-09-20 Sandisk Technologies Llc Non-volatile memory with multi-word line select for defect detection operations
US9443606B2 (en) 2014-10-28 2016-09-13 Sandisk Technologies Llc Word line dependent two strobe sensing mode for nonvolatile storage elements
US9875805B2 (en) 2015-01-23 2018-01-23 Sandisk Technologies Llc Double lockout in non-volatile memory
US9564213B2 (en) 2015-02-26 2017-02-07 Sandisk Technologies Llc Program verify for non-volatile storage
KR20160108770A (en) 2015-03-06 2016-09-20 에스케이하이닉스 주식회사 Semiconductor memory device and operating method thereof
US9548130B2 (en) 2015-04-08 2017-01-17 Sandisk Technologies Llc Non-volatile memory with prior state sensing
US9570179B2 (en) 2015-04-22 2017-02-14 Sandisk Technologies Llc Non-volatile memory with two phased programming
US9659666B2 (en) 2015-08-31 2017-05-23 Sandisk Technologies Llc Dynamic memory recovery at the sub-block level
US9711211B2 (en) 2015-10-29 2017-07-18 Sandisk Technologies Llc Dynamic threshold voltage compaction for non-volatile memory
US9564226B1 (en) 2015-10-30 2017-02-07 Sandisk Technologies Llc Smart verify for programming non-volatile memory
US10014063B2 (en) 2015-10-30 2018-07-03 Sandisk Technologies Llc Smart skip verify mode for programming a memory device
US9842655B2 (en) 2015-12-08 2017-12-12 Intel Corporation Reducing verification checks when programming a memory device
US9698676B1 (en) 2016-03-11 2017-07-04 Sandisk Technologies Llc Charge pump based over-sampling with uniform step size for current detection
US10452480B2 (en) 2017-05-25 2019-10-22 Micron Technology, Inc. Memory device with dynamic processing level calibration
US10140040B1 (en) 2017-05-25 2018-11-27 Micron Technology, Inc. Memory device with dynamic program-verify voltage calibration
US10373696B2 (en) * 2017-08-18 2019-08-06 Western Digital Technologies, Inc. Methods and operations using XNOR functions with flash devices and solid state drives
TWI646550B (en) * 2017-12-08 2019-01-01 旺宏電子股份有限公司 Non-volatile memory and program method thereof
US10566063B2 (en) 2018-05-16 2020-02-18 Micron Technology, Inc. Memory system with dynamic calibration using a trim management mechanism
US10664194B2 (en) 2018-05-16 2020-05-26 Micron Technology, Inc. Memory system with dynamic calibration using a variable adjustment mechanism
US10990466B2 (en) 2018-06-20 2021-04-27 Micron Technology, Inc. Memory sub-system with dynamic calibration using component-based function(s)
CN109524047B (en) * 2018-10-15 2021-04-16 上海华虹宏力半导体制造有限公司 Byte programming retry method of flash memory
US10741568B2 (en) 2018-10-16 2020-08-11 Silicon Storage Technology, Inc. Precision tuning for the programming of analog neural memory in a deep learning artificial neural network
KR102528274B1 (en) 2018-11-06 2023-05-02 삼성전자주식회사 Nonvolatile memory device and method for operating thereof
US10910075B2 (en) 2018-11-13 2021-02-02 Sandisk Technologies Llc Programming process combining adaptive verify with normal and slow programming speeds in a memory device
KR102641097B1 (en) * 2018-12-31 2024-02-27 삼성전자주식회사 Resistive memory device and programming method of the same
US10748622B2 (en) 2019-01-21 2020-08-18 Sandisk Technologies Llc State adaptive predictive programming
CN111863087B (en) * 2019-04-29 2022-08-30 北京兆易创新科技股份有限公司 Method and device for controlling programming performance
US11081198B2 (en) 2019-05-16 2021-08-03 Sandisk Technologies Llc Non-volatile memory with countermeasure for over programming
US10839928B1 (en) 2019-05-16 2020-11-17 Sandisk Technologies Llc Non-volatile memory with countermeasure for over programming
CN112945355A (en) * 2021-01-27 2021-06-11 武汉正维电子技术有限公司 Double-pulse data acquisition method
US11556416B2 (en) 2021-05-05 2023-01-17 Apple Inc. Controlling memory readout reliability and throughput by adjusting distance between read thresholds
CN115512747A (en) 2021-06-23 2022-12-23 桑迪士克科技有限责任公司 Apparatus and method for intelligent verification with adjacent plane interference detection
US11847342B2 (en) 2021-07-28 2023-12-19 Apple Inc. Efficient transfer of hard data and confidence levels in reading a nonvolatile memory
JP2023093187A (en) * 2021-12-22 2023-07-04 キオクシア株式会社 semiconductor storage device

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5218569A (en) * 1991-02-08 1993-06-08 Banks Gerald J Electrically alterable non-volatile memory with n-bits per memory cell
US6222762B1 (en) * 1992-01-14 2001-04-24 Sandisk Corporation Multi-state memory
KR100253868B1 (en) 1995-11-13 2000-05-01 니시무로 타이죠 Non-volatile semiconductor memory device
JP3409986B2 (en) 1997-01-31 2003-05-26 株式会社東芝 Multi-valued memory
KR100327421B1 (en) * 1997-12-31 2002-07-27 주식회사 하이닉스반도체 Program system of non-volatile memory device and programming method thereof
JP2000040382A (en) 1998-07-23 2000-02-08 Sony Corp Non-volatile semiconductor memory device and data write method thereof
JP2001067884A (en) 1999-08-31 2001-03-16 Hitachi Ltd Nonvolatile semiconductor memory device
KR100319559B1 (en) 1999-11-01 2002-01-05 윤종용 Multi-state nonvolatile semiconductor memory device which is capable of regularly maintaining a margin between threshold voltage distributions
US6538922B1 (en) * 2000-09-27 2003-03-25 Sandisk Corporation Writable tracking cells
US20020156973A1 (en) * 2001-01-29 2002-10-24 Ulrich Thomas R. Enhanced disk array
US6522580B2 (en) 2001-06-27 2003-02-18 Sandisk Corporation Operating techniques for reducing effects of coupling between storage elements of a non-volatile memory operated in multiple data states
US6621739B2 (en) * 2002-01-18 2003-09-16 Sandisk Corporation Reducing the effects of noise in non-volatile memories through multiple reads

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2004053882A1 *

Also Published As

Publication number Publication date
TW200418043A (en) 2004-09-16
US7073103B2 (en) 2006-07-04
ATE357727T1 (en) 2007-04-15
KR20050101159A (en) 2005-10-20
WO2004053882A1 (en) 2004-06-24
EP1568041B1 (en) 2007-03-21
KR101017321B1 (en) 2011-02-28
DE60312729T2 (en) 2007-12-06
CN1720586B (en) 2011-05-18
TWI314325B (en) 2009-09-01
JP2006509326A (en) 2006-03-16
US20040109362A1 (en) 2004-06-10
US7243275B2 (en) 2007-07-10
US7584391B2 (en) 2009-09-01
AU2003296003A1 (en) 2004-06-30
JP4382675B2 (en) 2009-12-16
DE60312729D1 (en) 2007-05-03
US20070234144A1 (en) 2007-10-04
US20060107136A1 (en) 2006-05-18
CN1720586A (en) 2006-01-11

Similar Documents

Publication Publication Date Title
US7073103B2 (en) Smart verify for multi-state memories
US7839690B2 (en) Adaptive erase and soft programming for memory
US7663914B2 (en) Method of programming a multi bit flash memory device to avoid programming errors and a device implementing the same
US9389938B2 (en) Apparatus and method for determining an operating condition of a memory cell based on cycle information
US8000149B2 (en) Non-volatile memory device
US7616499B2 (en) Retention margin program verification
US8184479B2 (en) Reducing the impact of interference during programming
US7551487B2 (en) Nonvolatile memory device and related programming method
US7564718B2 (en) Method for programming a block of memory cells, non-volatile memory device and memory card device
JP4638544B2 (en) Method and apparatus for improved program verify operation in non-volatile memory
US20040179404A1 (en) Method and system for programming and inhibiting multi-level, non-volatile memory cells
TW201306035A (en) Non-volatile memory and method having efficient on-chip block-copying with controlled error rate
US7652918B2 (en) Retention margin program verification
US20060039207A1 (en) Self-adaptive program delay circuitry for programmable memories
EP1782426B1 (en) Self-adaptive program delay circuitry for programmable memories

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20050601

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL LT LV MK

DAX Request for extension of the european patent (deleted)
GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SANDISK CORPORATION

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

Ref country code: CH

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

Ref country code: BE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

Ref country code: LI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REF Corresponds to:

Ref document number: 60312729

Country of ref document: DE

Date of ref document: 20070503

Kind code of ref document: P

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070621

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070702

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070821

ET Fr: translation filed
REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

26N No opposition filed

Effective date: 20071227

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20071222

Year of fee payment: 5

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070622

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20071227

Year of fee payment: 5

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20071231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20071203

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20081201

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070621

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20071201

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070922

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070321

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20081201

REG Reference to a national code

Ref country code: NL

Ref legal event code: SD

Effective date: 20111229

REG Reference to a national code

Ref country code: FR

Ref legal event code: TP

Owner name: SANDISK TECHNOLOGIES INC., US

Effective date: 20120229

REG Reference to a national code

Ref country code: DE

Ref legal event code: R082

Ref document number: 60312729

Country of ref document: DE

Representative=s name: PATENTANWAELTE MAXTON LANGMAACK & PARTNER, DE

REG Reference to a national code

Ref country code: DE

Ref legal event code: R082

Ref document number: 60312729

Country of ref document: DE

Representative=s name: PATENTANWAELTE MAXTON LANGMAACK & PARTNER, DE

Effective date: 20120713

Ref country code: DE

Ref legal event code: R081

Ref document number: 60312729

Country of ref document: DE

Owner name: SANDISK TECHNOLOGIES INC., PLANO, US

Free format text: FORMER OWNER: SANDISK CORP., MILPITAS, CALIF., US

Effective date: 20120713

Ref country code: DE

Ref legal event code: R082

Ref document number: 60312729

Country of ref document: DE

Representative=s name: PATENTANWAELTE LIPPERT, STACHOW & PARTNER, DE

Effective date: 20120713

Ref country code: DE

Ref legal event code: R081

Ref document number: 60312729

Country of ref document: DE

Owner name: SANDISK TECHNOLOGIES LLC, PLANO, US

Free format text: FORMER OWNER: SANDISK CORP., MILPITAS, CALIF., US

Effective date: 20120713

Ref country code: DE

Ref legal event code: R082

Ref document number: 60312729

Country of ref document: DE

Representative=s name: LIPPERT STACHOW PATENTANWAELTE RECHTSANWAELTE , DE

Effective date: 20120713

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20081201

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20131209

Year of fee payment: 11

Ref country code: NL

Payment date: 20131210

Year of fee payment: 11

REG Reference to a national code

Ref country code: DE

Ref legal event code: R082

Ref document number: 60312729

Country of ref document: DE

Representative=s name: PATENTANWAELTE LIPPERT, STACHOW & PARTNER, DE

Ref country code: DE

Ref legal event code: R082

Ref document number: 60312729

Country of ref document: DE

Representative=s name: LIPPERT STACHOW PATENTANWAELTE RECHTSANWAELTE , DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: V1

Effective date: 20150701

REG Reference to a national code

Ref country code: NL

Ref legal event code: V1

Effective date: 20150701

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20150831

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150701

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20141231

REG Reference to a national code

Ref country code: DE

Ref legal event code: R082

Ref document number: 60312729

Country of ref document: DE

Representative=s name: PATENTANWAELTE LIPPERT, STACHOW & PARTNER, DE

Ref country code: DE

Ref legal event code: R081

Ref document number: 60312729

Country of ref document: DE

Owner name: SANDISK TECHNOLOGIES LLC, PLANO, US

Free format text: FORMER OWNER: SANDISK TECHNOLOGIES INC., PLANO, TEX., US

Ref country code: DE

Ref legal event code: R082

Ref document number: 60312729

Country of ref document: DE

Representative=s name: LIPPERT STACHOW PATENTANWAELTE RECHTSANWAELTE , DE

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20190930

Year of fee payment: 17

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 60312729

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210701